Angecryption implementation in Python
☆17Jun 2, 2019Updated 6 years ago
Alternatives and similar repositories for AngeCryption
Users that are interested in AngeCryption are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2022-22947_POC_EXP☆13Mar 17, 2022Updated 4 years ago
- Hide My Ass + Squid Docker image☆10Apr 24, 2017Updated 9 years ago
- Double-free vulnerability in DDGifSlurp in decoding.c in libpl_droidsonroids_gif can read more https://awakened1712.github.io/hacking/hac…☆16Oct 23, 2019Updated 6 years ago
- Future Of Phishing With less delay☆15Sep 21, 2023Updated 2 years ago
- Code for the AnecbotalNYT Twitter bot☆16Sep 23, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Spams GAC (Grab Activation Code) SMS to a phone number repeatedly☆82Feb 24, 2020Updated 6 years ago
- Python wrapper to use FlowDroid APK analyzer.☆11Jan 30, 2023Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 5 years ago
- Backwards compatible callback APIs☆19Jun 9, 2020Updated 5 years ago
- ☆11Feb 14, 2025Updated last year
- Python tool to inject DLLs into processes☆11Jun 29, 2017Updated 8 years ago
- ☆28Jun 18, 2019Updated 6 years ago
- This repo contains scripts, frameworks, and other tools related to DDoS.☆35Aug 24, 2019Updated 6 years ago
- Follow up to the DREBIN paper☆13Dec 27, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- terminal splash screen based on ascii art ideal for bash or sh consoles☆12May 6, 2019Updated 6 years ago
- TriFlow: Triaging Android Applications using Speculative Information Flows☆13Dec 26, 2022Updated 3 years ago
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆13Jan 29, 2020Updated 6 years ago
- android-malware-classification using machine learning algorithms☆11Aug 17, 2020Updated 5 years ago
- A collection of ReactJS exercises samples based on tutorial videos of Udemy's Modern React with Redux course, created by Stephen Grider☆11Jan 7, 2019Updated 7 years ago
- Heartbleed vulnerability exploited 🩸☆19Apr 11, 2023Updated 3 years ago
- PHP ransomware that encrypts your files, as well as file and directory names.☆113Apr 25, 2023Updated 3 years ago
- Evaluation of ML models in Android malware classification, adversarial attacks on DNNs & defense mechanisms☆13Jan 14, 2020Updated 6 years ago
- Polymorph file protector☆43Jun 12, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- lightweight CVE search☆22Dec 24, 2025Updated 4 months ago
- Disabling Windows Defender & downloading payload☆20Jul 28, 2020Updated 5 years ago
- A python3 module that converts your bs4 Tag into json object (dict)☆16Mar 17, 2026Updated last month
- SocialFish-Clone☆12May 3, 2018Updated 7 years ago
- Some of my config files☆12Feb 11, 2023Updated 3 years ago
- ☆18Apr 27, 2018Updated 8 years ago
- Scripts that filter the output from some Android `dumpsys` commands to make them more readable.☆11Apr 14, 2020Updated 6 years ago
- ☆10Mar 30, 2019Updated 7 years ago
- WhatScriptApp es un programa que nos ayudara a hacer spam masivo , el proyecto lo he realizado mas que todo para marketing digital cuando…☆10Aug 4, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Malware Classification using Graph Clustering☆14Nov 12, 2012Updated 13 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Sends packets to McDonald's server to spoof Fries Hit game events/score☆16Sep 24, 2020Updated 5 years ago
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- Library for dealing with command line options for bash and zsh☆14Mar 23, 2011Updated 15 years ago
- This is my final project for my Artificial Intelligence class. I generated pattern databases of subsets of the Rubik's cube via a breadt…☆11May 31, 2018Updated 7 years ago
- Lonely x64 binary to Bypass Win10 UAC utilizing ALPC method with [command line]☆32Jun 30, 2023Updated 2 years ago