☆11Apr 1, 2025Updated 11 months ago
Alternatives and similar repositories for camtruder
Users that are interested in camtruder are comparing it to the libraries listed below
Sorting:
- ☆13Mar 1, 2024Updated 2 years ago
- SysPwn☆10Oct 13, 2024Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- A Terminal UI control plane for OpenSnitch, an application firewall for Linux inspired by Little Snitch☆23Dec 18, 2025Updated 3 months ago
- Curated list of Cyber Security acronyms & abbreviations☆43Jan 19, 2026Updated 2 months ago
- ZenScraper is an asynchronous scraper built with Python and Playwright designed for efficiently retrieving tweets from X.com (formerly Tw…☆15May 9, 2025Updated 10 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- ☆11Feb 15, 2025Updated last year
- onlyfans downloader☆15Jan 11, 2026Updated 2 months ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Jun 23, 2016Updated 9 years ago
- combo lists for dev testing☆11Jan 15, 2019Updated 7 years ago
- A simple Agent Development Kit starter repo with one agent that can get the top Hacker News posts and the trending GitHub repos☆17Apr 21, 2025Updated 10 months ago
- WPF helper library☆14Apr 6, 2019Updated 6 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- Una lista de conferencias de Android en LatAm☆12Nov 9, 2018Updated 7 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆52Feb 22, 2024Updated 2 years ago
- ☆19Mar 30, 2021Updated 4 years ago
- Integrated keylogger with telegram☆18Oct 29, 2024Updated last year
- The Router Exploitation Framework☆12Nov 10, 2017Updated 8 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Aug 7, 2024Updated last year
- EH-Bble☆10Jul 23, 2019Updated 6 years ago
- A curated list of amazingly libraries, services and resources to work with PDF files☆16Jan 28, 2026Updated last month
- An example of pytest-bdd☆10Jul 6, 2017Updated 8 years ago
- Response Filter Denial of Service (RFDoS) Experimental Scanner☆16Nov 10, 2024Updated last year
- ☆20Jan 12, 2022Updated 4 years ago
- PhotoTags Synchronizer keeps your metadata tags where it belongs...☆14May 26, 2025Updated 9 months ago
- ☆14Dec 24, 2023Updated 2 years ago
- Job Hunting Scripts☆34Jun 9, 2025Updated 9 months ago
- ⏰ Hours of operation☆21Sep 1, 2017Updated 8 years ago
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- ☆19Sep 17, 2025Updated 6 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Cybersecurity Psychology Framework☆20Feb 22, 2026Updated 3 weeks ago
- Juice Jacking / Automatic Android Rooting based on Intel Edison using dirty c0w☆11Nov 16, 2016Updated 9 years ago
- ☆20Jun 5, 2021Updated 4 years ago
- ☆10Mar 11, 2024Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Jun 10, 2025Updated 9 months ago
- Hunt Open MongoDB instances☆79Sep 25, 2019Updated 6 years ago