ViRb3 / poweruser
πͺ Collection of tips, tricks and scripts for becoming a true poweruser
β27Updated last year
Alternatives and similar repositories for poweruser:
Users that are interested in poweruser are comparing it to the libraries listed below
- dnscrypt - authenticated and encrypted dns client for nodejsβ14Updated 4 years ago
- Dump Windows registry hives as text.β16Updated 5 years ago
- Windows productivity tweaksβ14Updated 4 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SYβ¦β15Updated 7 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Useβ¦β18Updated 7 years ago
- RegFineViewer is an utility to visualize and navigate easily the Windows Registryβ16Updated 4 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.β28Updated 6 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systemsβ26Updated 6 years ago
- Feitian Rockey4ND dongle testingβ30Updated 2 years ago
- Sophos Deobfuscation Tool. Deobfuscates passwords obfuscated with Sophos Obfuscation Tool.β16Updated 7 years ago
- Clone repository for Source Code secret anti-forensic tools Marble Framework CIA, Leaked by WikiLeaks.β30Updated 7 years ago
- research chrome stored databases - dumping all urlsβ35Updated 7 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchersβ17Updated 5 years ago
- Tor Browser Downloader - Automates download and verification of Tor Browser from The Tor Project's website. This package is produced indeβ¦β15Updated last week
- This is a basic example of how to search into Shodan using the ShodanAPI.β15Updated 11 years ago
- The pattern matching swiss knifeβ15Updated 5 years ago
- Demonstrate the behavior of the tunnel cache on Windowsβ9Updated 5 years ago
- GPLv2 tool that auto-reverse-engineers Android applications and rips out sensitive API calls. Its awesome.β21Updated 11 years ago
- A curated list of awesome malware analysis tools and resourcesβ15Updated 6 years ago
- Bash script using ADB to debloat non-rooted smartphones. Improve your privacy, the security and battery life of your device. THIS REPO ISβ¦β47Updated 3 years ago
- Tooling aiming to Identify Windows Installer images (ISOs, VHDs, VHDXs...)β25Updated 2 years ago
- Find all cool documents on GOV and Info sitesβ18Updated 5 years ago
- Capturing audio (.wav) from target using a linkβ12Updated 4 years ago
- Portable Executable launcher for Windows NT bypassing loaderβ68Updated last year
- Raspberry Pi Zero W based Wifi Dongle with VPN, Ad Blocking and moreβ8Updated 7 years ago
- List of NSO Pegasus's C2C Servers where will be used to control Pegasus.β16Updated last year
- Library and tools to access the Windows Hibernation File (hiberfil.sys) formatβ13Updated 6 months ago
- DLL and API hooking example to hide running in a Terminal Sessionβ16Updated 4 years ago
- Build and Interact with a Set of Virtual Machinesβ15Updated 2 years ago
- download, verify & run torbrowser in a sandboxβ18Updated last year