☆29Feb 22, 2024Updated 2 years ago
Alternatives and similar repositories for imgsv
Users that are interested in imgsv are comparing it to the libraries listed below
Sorting:
- ☆29Feb 22, 2024Updated 2 years ago
- ☆30Feb 22, 2024Updated 2 years ago
- ☆28Nov 30, 2023Updated 2 years ago
- yt downloader telegram bot☆27Sep 30, 2022Updated 3 years ago
- ☆37Oct 6, 2023Updated 2 years ago
- ☆38Oct 7, 2023Updated 2 years ago
- ☆39Oct 8, 2023Updated 2 years ago
- Participate in Hacktoberfest by contributing to any Open Source project on GitHub! Here is a starter project for first time contributors.…☆38Oct 4, 2023Updated 2 years ago
- ☆44Oct 23, 2025Updated 4 months ago
- This is the hacktoberfest 2022 repository.☆38Oct 6, 2023Updated 2 years ago
- ☆38Aug 20, 2023Updated 2 years ago
- ☆39Oct 6, 2023Updated 2 years ago
- ☆38Oct 6, 2023Updated 2 years ago
- ☆38Oct 6, 2023Updated 2 years ago
- ☆38Sep 29, 2023Updated 2 years ago
- ☆40Mar 1, 2022Updated 4 years ago
- My Modding Site☆40Mar 29, 2022Updated 3 years ago
- refer bot mde by reeshu for newbie☆38Sep 30, 2023Updated 2 years ago
- ☆40Mar 25, 2023Updated 2 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆12May 31, 2024Updated last year
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- Cybersecurity blog. Red Team, pentest, malware analysis and dev☆97Mar 2, 2026Updated last week
- Learning resources and external resources to help you prepare for your offsec certifications☆102Nov 1, 2024Updated last year
- It bridges my research with a functional tool. I want to provide a safe, open-source framework for hackers to test evasion and for defend…☆281Jan 26, 2026Updated last month
- Cybersecurity research results. Simple C/C++ and Python implementations☆301Mar 2, 2026Updated last week
- Node/Express Pluralsight Project Sample Application☆13Jun 26, 2018Updated 7 years ago
- An admission controller service and kubectl plugin to handle container drift in K8s clusters☆125Dec 2, 2021Updated 4 years ago
- ☆14Sep 24, 2017Updated 8 years ago
- Fast persistent key-value store for Nim, based on libmdbx☆85Apr 8, 2023Updated 2 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Simple, single-thread, non-caching, lightweight HTTP proxy server☆18Jul 11, 2022Updated 3 years ago
- Laravel Cashier provides an expressive, fluent interface to Stripe's subscription billing services.☆2,523Updated this week
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Interesting papers☆11Jun 22, 2024Updated last year
- Red Team AI Benchmark: Evaluating Uncensored LLMs for Offensive Security☆27Dec 25, 2025Updated 2 months ago
- Barycentric coordinates GCN shader extension sample for DirectX 11☆13Jan 13, 2021Updated 5 years ago