Zemerik / X-CloneView external linksLinks
A Thrilling X Clone
☆19Nov 19, 2024Updated last year
Alternatives and similar repositories for X-Clone
Users that are interested in X-Clone are comparing it to the libraries listed below
Sorting:
- It automatically picks OTP from sms. I implemented this without using any Flutter plugin.☆14Nov 15, 2022Updated 3 years ago
- Car Book App is a mobile application developed using Flutter with Firebase integration. It features a material mobile UI/UX design, drive…☆10May 22, 2023Updated 2 years ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- Simple Golang REST API Example (MONGODB)☆11Sep 13, 2016Updated 9 years ago
- A simplified version of X/Twitter built in React and Node.js using Express & MongoDB.☆16Mar 18, 2025Updated 10 months ago
- ☆15Apr 30, 2021Updated 4 years ago
- Simple Golang REST API Using Gin Framework and MongoDB☆11Oct 8, 2018Updated 7 years ago
- A Flutter Dashboard Home Screen App UI☆17Apr 5, 2021Updated 4 years ago
- Brute forcing login pages with SQL Injection queries with cURL☆17Feb 23, 2023Updated 2 years ago
- Raspberry Pi Hat for the RAK833 MiniPCI-E module☆16Jul 3, 2018Updated 7 years ago
- A flutter widget that slides through pages horizontally☆18Jun 5, 2019Updated 6 years ago
- Config files for my GitHub profile.☆25Apr 16, 2025Updated 9 months ago
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.☆37Sep 14, 2025Updated 5 months ago
- Python/Bash automation customization script designed to automate the reconnaissance process☆21Jan 28, 2024Updated 2 years ago
- An implementation of the One-Time Password (OTP) algorithm in Dart.☆23Jan 31, 2026Updated 2 weeks ago
- ☆27Nov 23, 2023Updated 2 years ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- OmniCrawl is a web measurement tool that allows for recording of web requests and JavaScript browser API accesses on multiple platforms.☆27Mar 20, 2024Updated last year
- ☆24Nov 18, 2023Updated 2 years ago
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆57Jul 2, 2025Updated 7 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- create a "simulated internet" cyber range environment☆19Jan 28, 2026Updated 2 weeks ago
- Beautiful phone number OTP verification UI in flutter☆43Aug 29, 2022Updated 3 years ago
- Cybersecurity Black Friday Deals repository! 🛡️🎁☆44Nov 23, 2023Updated 2 years ago
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆44Oct 27, 2024Updated last year
- Some of my rough notes for Docker threat detection☆49Aug 26, 2023Updated 2 years ago
- Check IP addresses against known cloud provider IP address ranges☆47Feb 7, 2026Updated last week
- Mining URLs from Wayback Machine for bug hunting/fuzzing/further probing☆54Oct 16, 2023Updated 2 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Apr 25, 2023Updated 2 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆63May 31, 2020Updated 5 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- PoC analyzer of your email address exposure on various services☆66Oct 9, 2023Updated 2 years ago
- PassBreaker☆65Apr 5, 2024Updated last year
- Bruteforces Fortinet SSL VPNs☆57Sep 19, 2023Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated last year
- A small executable to trick a user to authenticate using code matching MFA☆69Oct 6, 2023Updated 2 years ago