Links from X Posts
☆145May 2, 2026Updated this week
Alternatives and similar repositories for XLinks
Users that are interested in XLinks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- XBot - Advanced AI Cybersecurity Agent | Gemini system prompt for automated penetration testing and security assessments☆72Nov 29, 2025Updated 5 months ago
- https://github.com/infosecn1nja/AD-Attack-Defense☆16Jan 22, 2022Updated 4 years ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 10 months ago
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆116Apr 22, 2026Updated last week
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆22Apr 14, 2026Updated 2 weeks ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- A web application testing tool built for capturing and modifying http/https requests.☆15Oct 15, 2025Updated 6 months ago
- 這是一個具有終端風格界面的即時聊天應用,使 用 Flask、Socket.IO、Redis☆17Sep 9, 2024Updated last year
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year
- Rudimentary IP and URL threat feeds sourced from The Fakelabs Project.☆10Dec 13, 2025Updated 4 months ago
- Monitor product price, inventory and popularity across vendors 🤖☆10Dec 9, 2022Updated 3 years ago
- This project was initially developed with my classmate for a school course, but as we grew more enthusiastic about it, we decided to cont…☆23Jun 21, 2024Updated last year
- VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advan…☆24Mar 16, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆51Jun 16, 2025Updated 10 months ago
- Unofficial BrickSeek API☆12Jul 2, 2017Updated 8 years ago
- Organizes all tabs across windows into AI-generated groups. Uses your own OpenAI API Key.☆34Mar 22, 2024Updated 2 years ago
- A C++ String-like-class that does not save data as plain-text in memory. It makes live analysis of memory more difficult, as well as fore…☆13Aug 16, 2014Updated 11 years ago
- Gives medals to TOR relays☆10Jan 23, 2017Updated 9 years ago
- collection of blogs about malware development and analysis☆73Dec 2, 2025Updated 5 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 8 months ago
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆51Oct 28, 2025Updated 6 months ago
- A basic python based tool for domain ℹ️ information gathering. I am working 💻 on collecting information related to domain whois, history…☆13Jan 11, 2026Updated 3 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- DPG Campus Tool. Shrink massive PDFs to fit AI upload limits. Sanitize before uploading to reduce risk of exposing sensitive data.☆46Jan 20, 2026Updated 3 months ago
- Modifies the code of the RtlUserThreadStart callback and reads the arguments passed to it. Then it changes the initial execution argument…☆16Mar 4, 2018Updated 8 years ago
- Microsoft Vulnerable Driver Block Lists in CSV and JSON for SIEM lookups☆55Sep 19, 2025Updated 7 months ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆22Mar 20, 2025Updated last year
- ☆48Dec 21, 2025Updated 4 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 4 months ago
- An object-oriented pin-change interrupt handler library for the Arduino☆10Feb 15, 2017Updated 9 years ago
- ☆36Aug 21, 2024Updated last year
- It's Lenny - Tropo Implementation☆15Apr 17, 2016Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Reasonably undetected shellcode stager and executer.☆34May 23, 2025Updated 11 months ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 6 years ago
- .bin file to shellcode convertor☆39Jul 5, 2024Updated last year
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 6 months ago
- Burp Suite Professional Edition .☆19Jul 24, 2025Updated 9 months ago
- Sphinx.bot is a platform for collecting data leaks. All information recorded here is publicly available on the web. Any malicious use of …☆50Jul 25, 2023Updated 2 years ago
- #Hackertea is a sleek terminal user interface written in Golang, designed to bring HackerNews articles directly to your fingertips. Power…☆52Apr 3, 2026Updated last month