☆115Sep 29, 2022Updated 3 years ago
Alternatives and similar repositories for deep_exploit
Users that are interested in deep_exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Jun 19, 2024Updated last year
- Python RAT with reverse connection and asymmetric encrypted communications☆16Jun 30, 2020Updated 5 years ago
- ☆27Oct 30, 2020Updated 5 years ago
- Scanning Result of MetaScan's AI GPTScan Engine for 13 DefiHacks Projects under 10 Logic Vuln Types☆13Aug 8, 2023Updated 2 years ago
- Talk2Me interacts with OpenAI's language model to generate text responses and saves the conversation for future reference.☆15Sep 6, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Dark Patterns in Chatbot Design☆17Jun 15, 2024Updated last year
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year
- Tool for flashing firmware onto Samsung Galaxy devices☆15Jan 15, 2022Updated 4 years ago
- AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.☆909Mar 2, 2026Updated 3 weeks ago
- Content Security Policy Generator, Powered by RapidSec☆16Feb 28, 2021Updated 5 years ago
- PowerShell cmdlet to push PowerShell attack modules to a remote system via PSRemoting and if required enable WinRM remotely.☆28Sep 13, 2016Updated 9 years ago
- An interactive bash script for detecting IDOR vulnerabilities. Automates the discovery of access control issues in web applications, enha…☆15Apr 10, 2025Updated 11 months ago
- ☆13Sep 22, 2022Updated 3 years ago
- FlatBlur is a flat, minimal, blurried, mid-dark Kvantum theme.☆12Sep 23, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- Template app for a powershell script that uses a XAML gui☆19Jan 7, 2025Updated last year
- Monitoring a high precision 10MHz GPS disciplined oscillator (GPSDO)☆14Dec 1, 2024Updated last year
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- ☆11Nov 5, 2018Updated 7 years ago
- Um guia introdutório prático de Cybersegurança focado em CTFs no TryHackMe e HackTheBox.☆15Aug 21, 2025Updated 7 months ago
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆24Jun 25, 2023Updated 2 years ago
- ZeroShell Manager (GUI) is a Tool designed to help users manage their Webshells☆21Sep 28, 2024Updated last year
- OSINT tool for researching targets based on Email Address or Username using SerperDev, Firecrawl, HIBP & OSINT Industries APIs, and OpenA…☆16Sep 17, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated last year
- WhoDAT is an InfoSec Analyzer for Nerds using VirusTotal, Google Safe Browsing, URLScan, Hybrid-Analysis, and OpenAI. Scan URLs, emails, …☆13Jan 4, 2026Updated 2 months ago
- ☆38Dec 29, 2024Updated last year
- FortiOS 管理界面中的堆内存下溢导致远程代码执行☆23Jun 21, 2023Updated 2 years ago
- Simple UPI & PayPal Details Page with Click-to-Copy functionality to receive UPI and PayPal Donations.☆14Jan 22, 2025Updated last year
- NetScope is a network scanning and monitoring Ethical Hacking tool designed to help users discover and monitor devices in their network.I…☆20Oct 31, 2025Updated 4 months ago
- Who We Are☆22Sep 6, 2024Updated last year
- An advanced Python tool for extracting data from websites, cleaning the content, and converting it to high-quality Markdown for optimal u…☆20Mar 4, 2025Updated last year
- Example of WatchFaceDecomposition implementation for Wear OS watch face.☆11Jun 21, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- a Powershell script to Create / Populate a dummy Active Directory☆15May 28, 2024Updated last year
- some sploits☆19Sep 20, 2024Updated last year
- 域信息收集工具☆11Jun 5, 2023Updated 2 years ago
- Black Hat Ethical Hacking - Official Theme for Conky Manager☆18Sep 6, 2024Updated last year
- ☆10Apr 14, 2025Updated 11 months ago
- ☆11Sep 7, 2023Updated 2 years ago
- Optimized for use in Kali Linux, KSploit is a user friendly menu driven control panel in which to drive many metasploit tasks. KSploit s…☆17Jul 2, 2025Updated 8 months ago