Extracted data & informations from the Conti & TrickBot leaks.
☆15Mar 12, 2022Updated 4 years ago
Alternatives and similar repositories for Conti-Clear
Users that are interested in Conti-Clear are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13May 27, 2020Updated 5 years ago
- Basic password cracker. These tools can be used to crack various types of password hashes, the program applies the technique to recover t…☆10Mar 22, 2023Updated 3 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 11 years ago
- Scans Onion sites for keywords and if found, will send an email alert to designated email address. Ideal for individuals or companies who…☆34Oct 9, 2020Updated 5 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆14Mar 4, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆16Oct 10, 2016Updated 9 years ago
- An OSINT tool to find data leaks on a targeted website☆18Mar 30, 2021Updated 5 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Apr 5, 2018Updated 8 years ago
- Hacking Password☆12Jul 24, 2018Updated 7 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Oct 25, 2018Updated 7 years ago
- Sphinx.bot is a platform for collecting data leaks. All information recorded here is publicly available on the web. Any malicious use of …☆50Jul 25, 2023Updated 2 years ago
- Password cracking software written in python using Tkinter. Supports rar and zip files.☆15Mar 20, 2021Updated 5 years ago
- hi guys you can use this tool to crack anyones instagram password . if you need to use this tool just got to have some basic hacking know…☆16Mar 18, 2020Updated 6 years ago
- Developed a plugin which use facial images as input data to create 3D models in Maya and can be used in generating digital human process.☆12May 23, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- GForce is a bruteforce programm. GForce can hack a gmail account with a big list of passwords. Only for pentesting! :D☆12Jul 26, 2016Updated 9 years ago
- Contains files created with Design Spark PCB Capture Software☆13Aug 20, 2017Updated 8 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Oct 8, 2016Updated 9 years ago
- https://sites.google.com/securifyinc.com/secblogs/finding-leaked-sensitive-data☆17Jun 14, 2018Updated 7 years ago
- Proof of concept on how one can automate Cisco Modeling Labs in order to deliver networking courses using virtual labs.☆12Nov 23, 2020Updated 5 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated 2 years ago
- Last Day on Earth: Data mining and Leaks☆13Dec 12, 2018Updated 7 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 8 years ago
- Algorithm to texture 3D reconstructions from multi-view stereo images☆12Aug 18, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Quickly look up hashes in your terminal using the HashMob API 🔥☆15Apr 16, 2023Updated 3 years ago
- POC to demostrates how to hack a bank account on C#☆19Aug 26, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/wifi-password-hack☆30Sep 7, 2015Updated 10 years ago
- Tools for exploring Ubiquiti UniFi inform traffic☆20Sep 22, 2024Updated last year
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated 4 months ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- There are millions of people talking about Facebook Account Hacking Tricks. However, a few ones who are in depth in HTML coding and IT ca…☆15Jan 24, 2013Updated 13 years ago
- Simple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!☆34Jan 10, 2021Updated 5 years ago
- Pine and Frida better together☆15Oct 30, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Alpha implementation of SingularityNET daemon for hosting AI services on the SNET decentralized network.☆15Oct 8, 2019Updated 6 years ago
- Compare A/AAAA DNS record for any domain in your browser by DoH JSON API.☆12Nov 13, 2023Updated 2 years ago
- I have develped an android hacking widget which runs in the background to demonstrate credential sniffing on a primitive android login ap…☆20Jun 29, 2017Updated 8 years ago
- Linux & Windows Solomon's Key (1986) port☆29Aug 30, 2020Updated 5 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 3 years ago