abhishivam1 / modsgalaxyView external linksLinks
My Modding Site
☆40Mar 29, 2022Updated 3 years ago
Alternatives and similar repositories for modsgalaxy
Users that are interested in modsgalaxy are comparing it to the libraries listed below
Sorting:
- ☆40Mar 1, 2022Updated 3 years ago
- ☆40Mar 25, 2023Updated 2 years ago
- This is the hacktoberfest 2022 repository.☆38Oct 6, 2023Updated 2 years ago
- Participate in Hacktoberfest by contributing to any Open Source project on GitHub! Here is a starter project for first time contributors.…☆38Oct 4, 2023Updated 2 years ago
- ☆38Sep 29, 2023Updated 2 years ago
- ☆38Aug 20, 2023Updated 2 years ago
- refer bot mde by reeshu for newbie☆38Sep 30, 2023Updated 2 years ago
- ☆38Oct 6, 2023Updated 2 years ago
- ☆44Oct 23, 2025Updated 3 months ago
- ☆39Oct 8, 2023Updated 2 years ago
- ☆38Oct 7, 2023Updated 2 years ago
- ☆38Oct 6, 2023Updated 2 years ago
- ☆37Oct 6, 2023Updated 2 years ago
- ☆39Oct 6, 2023Updated 2 years ago
- yt downloader telegram bot☆27Sep 30, 2022Updated 3 years ago
- ☆28Nov 30, 2023Updated 2 years ago
- ☆29Feb 22, 2024Updated last year
- ☆30Feb 22, 2024Updated last year
- ☆29Feb 22, 2024Updated last year
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆12May 31, 2024Updated last year
- OFFZONE 2024 Malware Persistence workshop☆22Dec 18, 2024Updated last year
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 3 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- Vulnerabilities exploitation examples, python☆23May 22, 2023Updated 2 years ago
- Cybersecurity blog. Red Team, pentest, malware analysis and dev☆98Feb 6, 2026Updated last week
- BSides Prishtina 2024 Malware Development and Persistence workshop☆123Jan 1, 2026Updated last month
- Cybersecurity research results. Simple C/C++ and Python implementations☆291Feb 5, 2026Updated last week
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,141May 13, 2023Updated 2 years ago
- MIUI 完美 图标补全计划☆449Jan 7, 2026Updated last month
- Everything you need to prepare for the Microsoft 365 Certified: Endpoint Administrator Associate!☆25Dec 16, 2023Updated 2 years ago
- Extracts npm packages into memory☆17Jan 26, 2017Updated 9 years ago
- Rewrite of Reactotron (previously Electron) in react-native-macos & windows☆20Nov 14, 2025Updated 3 months ago
- PyTorch and Torch implementation for our accepted CVPR 2020 paper (Oral): Controllable Orthogonalization in Training DNNs☆24Jan 19, 2021Updated 5 years ago
- A Super Mario Odyssey mod that adds time travel to your moves☆12Nov 3, 2022Updated 3 years ago
- A command line tool for pushing docker images into a corporate registry based on Kubernetes yaml files☆16Oct 16, 2024Updated last year