A super dope tool, that generates "corrupted" .PDF files of randomly unique file sizes (no two files of the same size or byte combination, ever); for those "online submissions" you never really completed offline.
☆14Oct 12, 2021Updated 4 years ago
Alternatives and similar repositories for DecoyNinja-Fake-Submissions-Generator
Users that are interested in DecoyNinja-Fake-Submissions-Generator are comparing it to the libraries listed below
Sorting:
- A super fast multithreaded ports scanner that scans for open listening ports on the target server with multiple methods and user-specifie…☆23May 28, 2021Updated 4 years ago
- A fast dictionary attack tool (700,000+ candidates per second), that attacks a supported hash with a user-defined dictionary file's candi…☆22May 3, 2021Updated 4 years ago
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- ☆28Jan 18, 2026Updated last month
- Jupyter Notebook Praktikum Projects. This is repository with data analyst educational projects from Yandex.Praktikum.☆12Feb 21, 2021Updated 5 years ago
- A command-line tool to apply or remove Apple Binary Protection from an application.☆51Apr 19, 2009Updated 16 years ago
- ☆12Sep 1, 2025Updated 6 months ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆13May 9, 2020Updated 5 years ago
- AGS Tool for translating games writen on Adventure Game Studio engine.☆12May 4, 2018Updated 7 years ago
- A tool for monitoring the progress of data through a pipe.☆12Oct 31, 2025Updated 4 months ago
- instagram bot reports spam☆10Oct 19, 2020Updated 5 years ago
- ☆11Jan 22, 2021Updated 5 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- A dnSpyEx extension for DotNet Universal Patcher.☆12Nov 24, 2023Updated 2 years ago
- C64 playroutine identity scanner☆14Jan 9, 2026Updated last month
- Collects and prepares a unified key dictionary for Chameleon Ultra and Flipper Zero☆27Mar 2, 2026Updated last week
- Generate cross-platform sound intimations, push notifications and get a telegram message when a process execution is finished in the clou…☆16Feb 24, 2023Updated 3 years ago
- A dictionary attack implementation, for the automated cracking of password-protected RAR files with the help of a supplied dictionary fil…☆40May 3, 2021Updated 4 years ago
- Russian plate recognition system (mobile application)☆17Jun 30, 2014Updated 11 years ago
- Run command as root without password☆12Jul 20, 2022Updated 3 years ago
- Brute force your iOS Restrictions Passcode from the key & salt☆15Aug 27, 2019Updated 6 years ago
- Manage collection of SBOMs (Software Bill of Materials)☆14Mar 25, 2024Updated last year
- ☄️ Fast, 100% Accurate, Anti Honeypot SSH Cracker 🔑☆15May 1, 2022Updated 3 years ago
- A quick'n'dirty static deobfuscator for TNT team x86_64 crack library☆21Apr 1, 2025Updated 11 months ago
- ☆14Jan 31, 2026Updated last month
- ☆18Mar 13, 2025Updated 11 months ago
- ☆11Apr 18, 2024Updated last year
- ☆12Jan 28, 2026Updated last month
- bypassing the twitter safety link firewall :)☆12May 4, 2025Updated 10 months ago
- Frida scripts to directly MitM all HTTPS traffic from a target mobile application☆10Jan 9, 2024Updated 2 years ago
- Lost and Found: Stopping Bluetooth Finders from Leaking Private Information☆14Apr 22, 2022Updated 3 years ago
- Quantitative analysis of location reports from Apple's offline finding (OF) location tracking system☆10Apr 20, 2021Updated 4 years ago
- This bot attends the online classes held on Microsoft teams, according to the given timetable.Informs if bot is successfully joined the m…☆11Feb 2, 2022Updated 4 years ago
- ☆11Dec 6, 2017Updated 8 years ago
- Utilize IBM Cloud Functions with OAuth 2.0 to enable authentication and authorization☆11Feb 14, 2022Updated 4 years ago
- Cracks password protected Inno Setup generated installers using JtR.☆11Jun 17, 2023Updated 2 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js☆11May 27, 2024Updated last year
- Researching vulnerabilities with iOS Shortcuts.☆15Apr 15, 2025Updated 10 months ago