A simple and scalable Android bot emulation framework, as presented at Black Hat Europe 2021's Arsenal, as well as atHack 2021's Arsenal
☆29Nov 8, 2021Updated 4 years ago
Alternatives and similar repositories for m3
Users that are interested in m3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for GeoGuessr / Geography (flags, countries, pictures, metas)☆13Jan 29, 2026Updated 3 months ago
- MAAPP is an Android/iOS App API penetration tool☆24Feb 23, 2023Updated 3 years ago
- Super good awesome☆10Jan 15, 2023Updated 3 years ago
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- SmartTokens are small-sized tangible tokens that can sense multiple types of motion, multiple types of touch/grip, and send input events …☆12Dec 11, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Read & write magnetic card data to magspoof (ATtiny85)☆12May 27, 2019Updated 6 years ago
- Cross-Platform Malware development framework [ MacOS, Linux & Windows ]☆23Nov 29, 2024Updated last year
- ATM Configurator aka Tyupkin trojan☆11Mar 23, 2015Updated 11 years ago
- Interactive hacking toolkit.☆14Oct 17, 2018Updated 7 years ago
- Properly Engineered Infection Kit, A framework for creating malware in C#. Multi-threaded, comes with a built-in MSIL obfuscator and pack…☆15Jun 30, 2011Updated 14 years ago
- Service for management of hosts where is present a malware developed using Richkware framework.☆18Feb 5, 2026Updated 3 months ago
- HexRaysPyTools merged! (@NyaMisty @oopsmishap @Tim-Sobolev @OrbitOn-line)☆15Dec 15, 2025Updated 5 months ago
- Recon Automation☆11Sep 14, 2024Updated last year
- Multiple ANOVA with Tukey Test to create an athleisure clothing ad campaign strategy using Google, Youtube, and Amazon search volume data…☆10Jul 7, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆17Oct 26, 2016Updated 9 years ago
- Image recon is a tool used to find the social media accounts associated with the uploading image.☆20Dec 18, 2020Updated 5 years ago
- A simple sketch that allows connecting to a public/private mqtt broker via the cellular network, and send data in JSON format.☆16May 7, 2021Updated 5 years ago
- Telegrip is a digital forensic tool that provides acquistion and analysis for Telegram-related cases.☆19May 11, 2022Updated 4 years ago
- RobotScraper is a simple tool written in Python to check each of the paths found in the robots.txt file and what HTTP response code they …☆15Jul 23, 2024Updated last year
- LightFlow: An intuitive, user-friendly framework for optics and photonics simulations, designed for educational and research applications…☆12Sep 8, 2023Updated 2 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- Twitter data around the Ukraine Invasion in February 2022☆15Jun 26, 2023Updated 2 years ago
- Web scraping is simply the process of using a social media web scraper to gather data automatically. It saves users time, effort and some…☆17Nov 6, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 一个Android通用svc跟踪以及hook方案——Frida-Seccomp☆19May 14, 2024Updated 2 years ago
- Python software that reads zone files, extract NS records, and detect cyclic dependencies☆35Feb 16, 2024Updated 2 years ago
- CoReRank: Ranking to Detect Users Involved in Blackmarket-based Collusive Retweeting Activities (WSDM 2019)☆12Feb 25, 2019Updated 7 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆12Apr 26, 2026Updated 3 weeks ago
- A bi-directional SMS proxy service☆17Apr 10, 2019Updated 7 years ago
- a hackable all-in-one CLI toolkit to make your life easier. fk everything!☆17May 13, 2022Updated 4 years ago
- It is a simple javascript app for painting☆15Jun 24, 2020Updated 5 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Hack Tricks and survival kit (For Bug Bounty Program Use)☆14Sep 10, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Sample that demonstrates how distribution groups can be converted to Office365 groups.☆21Feb 8, 2017Updated 9 years ago
- Harmless Android malware using the overlay technique to steal user credentials.☆89Jan 5, 2018Updated 8 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year