SHUR1K-N / DecoyNinja-Fake-Submissions-GeneratorView external linksLinks
A super dope tool, that generates "corrupted" .PDF files of randomly unique file sizes (no two files of the same size or byte combination, ever); for those "online submissions" you never really completed offline.
☆14Oct 12, 2021Updated 4 years ago
Alternatives and similar repositories for DecoyNinja-Fake-Submissions-Generator
Users that are interested in DecoyNinja-Fake-Submissions-Generator are comparing it to the libraries listed below
Sorting:
- A super fast multithreaded ports scanner that scans for open listening ports on the target server with multiple methods and user-specifie…☆23May 28, 2021Updated 4 years ago
- A fast dictionary attack tool (700,000+ candidates per second), that attacks a supported hash with a user-defined dictionary file's candi…☆22May 3, 2021Updated 4 years ago
- Jupyter Notebook Praktikum Projects. This is repository with data analyst educational projects from Yandex.Praktikum.☆11Feb 21, 2021Updated 4 years ago
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- ☆28Jan 18, 2026Updated 3 weeks ago
- A command-line tool to apply or remove Apple Binary Protection from an application.☆51Apr 19, 2009Updated 16 years ago
- ☆12Sep 1, 2025Updated 5 months ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆12May 9, 2020Updated 5 years ago
- C64 playroutine identity scanner☆14Jan 9, 2026Updated last month
- instagram bot reports spam☆10Oct 19, 2020Updated 5 years ago
- A tool for monitoring the progress of data through a pipe.☆12Oct 31, 2025Updated 3 months ago
- AGS Tool for translating games writen on Adventure Game Studio engine.☆12May 4, 2018Updated 7 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- Generate cross-platform sound intimations, push notifications and get a telegram message when a process execution is finished in the clou…☆16Feb 24, 2023Updated 2 years ago
- ☆11Jan 22, 2021Updated 5 years ago
- A dnSpyEx extension for DotNet Universal Patcher.☆12Nov 24, 2023Updated 2 years ago
- ☆14Updated this week
- A dictionary attack implementation, for the automated cracking of password-protected RAR files with the help of a supplied dictionary fil…☆40May 3, 2021Updated 4 years ago
- bypassing the twitter safety link firewall :)☆12May 4, 2025Updated 9 months ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆15Jun 8, 2023Updated 2 years ago
- Run command as root without password☆12Jul 20, 2022Updated 3 years ago
- Lost and Found: Stopping Bluetooth Finders from Leaking Private Information☆14Apr 22, 2022Updated 3 years ago
- AsusWRT-Merlin FW 384.15+ WAN IP Change Email Notification Script☆15Dec 5, 2025Updated 2 months ago
- Some useful scripts written for PowerShell and cmd☆12Jun 19, 2015Updated 10 years ago
- Injected hook for the [defunct] UE3 game, Hawken. The goal of this project is to reimplement the stripped dedicated server functionality …☆13Jun 24, 2023Updated 2 years ago
- Cracks password protected Inno Setup generated installers using JtR.☆11Jun 17, 2023Updated 2 years ago
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆11Aug 14, 2024Updated last year
- Unpacks java-to-exe files converted by JWrapper☆12Dec 5, 2022Updated 3 years ago
- Multicolor Metacity themes for Mate and Cinnamon DEs☆11Feb 17, 2017Updated 8 years ago
- Brute force your iOS Restrictions Passcode from the key & salt☆14Aug 27, 2019Updated 6 years ago
- This bot attends the online classes held on Microsoft teams, according to the given timetable.Informs if bot is successfully joined the m…☆11Feb 2, 2022Updated 4 years ago
- ☆11Dec 6, 2017Updated 8 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Russian plate recognition system (mobile application)☆17Jun 30, 2014Updated 11 years ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Aug 4, 2025Updated 6 months ago
- Researching vulnerabilities with iOS Shortcuts.☆15Apr 15, 2025Updated 10 months ago
- ☆23Sep 17, 2025Updated 4 months ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 2 years ago
- Utilize IBM Cloud Functions with OAuth 2.0 to enable authentication and authorization☆11Feb 14, 2022Updated 4 years ago