😈 The Demon App Store
☆30Aug 18, 2021Updated 4 years ago
Alternatives and similar repositories for Demon-App-Store
Users that are interested in Demon-App-Store are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Summon Demon Linux☆39May 31, 2024Updated last year
- Demon Pentest Shell☆15Aug 4, 2021Updated 4 years ago
- Wordlists generated over the years of penetration testing☆13Mar 18, 2025Updated last year
- Sponsored By Mr ROBOT☆14Nov 15, 2020Updated 5 years ago
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- eternalrelayx☆36Jul 10, 2019Updated 6 years ago
- Manage the metasploit framework database☆16Nov 8, 2020Updated 5 years ago
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- ☆13Mar 17, 2021Updated 5 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- ZAP Admin☆32May 13, 2026Updated last week
- Its like airgeddon but better!☆61Jul 27, 2024Updated last year
- ☆20Aug 17, 2018Updated 7 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Jul 21, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Central Internal Auditing: Audit model events like update/create/delete + attribute changes + grouped them by transaction, in normalized …☆13Jul 3, 2024Updated last year
- Red Widow Spider Tools☆32Apr 9, 2026Updated last month
- ☆543May 11, 2026Updated last week
- Note:- Run this Script in root user.☆16Oct 13, 2017Updated 8 years ago
- A C# tool to send emails through Outlook from the command line or in memory☆32Jun 17, 2020Updated 5 years ago
- BlackArch Linux Slim ISO☆22Jun 30, 2018Updated 7 years ago
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- OWASp PureCaptcha project☆25Dec 15, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆32Nov 10, 2024Updated last year
- Useful related to airgeddon packages for Debian based Linux distributions☆59Apr 22, 2026Updated 3 weeks ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- ☆15Mar 16, 2023Updated 3 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- 3D printed mini circular table saw.☆11Jul 19, 2014Updated 11 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆27Jun 18, 2024Updated last year
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆17Aug 20, 2023Updated 2 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆52Feb 28, 2017Updated 9 years ago
- a collection of useful scripts that for penetration testers☆35Jan 22, 2022Updated 4 years ago
- Phishing Tool☆24Feb 19, 2018Updated 8 years ago
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆33Aug 1, 2021Updated 4 years ago