Toukoms / aizokuLinks
Aizoku is a local-first AI assistant built for everyone.
☆16Updated 3 months ago
Alternatives and similar repositories for aizoku
Users that are interested in aizoku are comparing it to the libraries listed below
Sorting:
- Facing a retake exam, I built an interpreter and compiler for this language rather than just learning it. Now this code is both my teache…☆20Updated 2 months ago
- A tool to generate a truth table via expressions developed with Bun☆15Updated 6 months ago
- Check your ranking in GitHub! Don't forget to star ⭐ this repository.☆15Updated 5 months ago
- Malware attacks/techniques explained☆186Updated 2 months ago
- Modern cybersecurity tools platform built with React and TypeScript. This provides a collection of essential security tools with a sleek,…☆22Updated 2 months ago
- 1.6 billion passwords☆94Updated 4 years ago
- This repo contains my writeups and code from YouTube videos☆43Updated 6 months ago
- ☆31Updated 5 months ago
- Quotes Gasy aka QG dia mitahiry quotes-na malagasy nalaza na malaza.☆29Updated last year
- A proof of concept reverse shell in Rust for Windows and Linux.☆11Updated 4 years ago
- CLI to manage multiple Git user profiles easily on a single machine.☆14Updated 5 months ago
- 3 ways of bypassing admin restrictions/uac☆245Updated last year
- ☆13Updated last year
- ☆48Updated 2 weeks ago
- I created this code template for you, inspired by almost every problem on LeetCode. Good luck to you all :)☆36Updated 11 months ago
- ☆26Updated 2 months ago
- This project is based upon the trick that, how to hack WI-FI with CMD. The main purpose behind, creating wifi hacking tool with cmd tool …☆349Updated 6 months ago
- ☆208Updated 7 months ago
- Activate your windows machines in one step.☆112Updated last year
- A simple implementation of a trojan malware in python☆23Updated 4 years ago
- The source for the Linux kernel used in Windows Subsystem for Linux 2 (WSL2)☆68Updated last year
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆37Updated 3 weeks ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆37Updated last year
- Marlowe Malwares is a comprehensive repository dedicated to the aggregation, analysis, and management of malware samples written in vario…☆34Updated 7 months ago
- ☆113Updated 2 years ago
- A tool for automatically change the Tor IP address over time.☆98Updated 5 months ago
- TryHackMe Roadmap☆47Updated last year
- Writeups for Vulnhub, Tryhackme and Others☆13Updated 2 years ago
- What the name says....☆99Updated last year
- ☆61Updated last year