تجربتي مع اختبار eJPT
☆38May 8, 2021Updated 4 years ago
Alternatives and similar repositories for eJPT
Users that are interested in eJPT are comparing it to the libraries listed below
Sorting:
- ☆12Jul 29, 2019Updated 6 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- Bot per leggere i livelli idrometrici dei fiumi dell'Emilia Romagna riportati da allertameteo.regione.emilia-romagna.it.☆12Updated this week
- Rudimentary IP and URL threat feeds sourced from The Fakelabs Project.☆10Dec 13, 2025Updated 2 months ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- open source knowledge for Syllabics font design and development☆10Nov 13, 2024Updated last year
- Script Open Source Facebook Crack Indonesia👾💥☆12Jan 6, 2024Updated 2 years ago
- Small chrome plugin to temporarily show deleted messages in WhatsApp Web☆12Dec 18, 2018Updated 7 years ago
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆12May 12, 2025Updated 9 months ago
- YouTube Revanced patching with Revancify Tools (Root & Non-Root)☆11Oct 26, 2025Updated 4 months ago
- ☆10Apr 2, 2022Updated 3 years ago
- Blog☆10Jul 18, 2023Updated 2 years ago
- ☆10Jun 26, 2024Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- A PowerShell script that continuously monitors and disables Windows Efficiency Mode for web browsers, ensuring optimal performance even w…☆23Jun 10, 2025Updated 8 months ago
- This is a Kind of Dictionary which contains all kinds of Web Application and Network Security Vulnerabilities and other security concepts…☆85Mar 18, 2025Updated 11 months ago
- An example MS-W32T client to show how to use midl.exe in a project managed by CMake☆11Feb 25, 2023Updated 3 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- ☆11Oct 25, 2021Updated 4 years ago
- game of active directory (SnapLabs version)☆15Aug 12, 2025Updated 6 months ago
- Crack Facebook Flash Tap☆18Feb 14, 2024Updated 2 years ago
- Crawl4DeepSeek = Crawl4AI + DeepSeek 🚀 Smart, efficient, and built for deep web exploration! 🌐🤖☆19Feb 9, 2025Updated last year
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- BetterDiscord plugin for automatic time tracking and stats about your Discord usage☆15Feb 25, 2024Updated 2 years ago
- Reverse Engineering 4 Fun & Profit☆24May 27, 2025Updated 9 months ago
- ☆16Mar 3, 2025Updated last year
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- ☆11Jan 4, 2023Updated 3 years ago
- A Forth interpreter/compiler and IDE for Atari ST☆13Sep 15, 2012Updated 13 years ago
- Uma pequena coleção de malwares produzidos para atacar em território nacional☆15Feb 26, 2018Updated 8 years ago
- Extract WinSCP Credentials from any Windows System or winscp config file☆22Jul 10, 2025Updated 7 months ago
- MavLink Protocol Drone Exploiting Tool☆15Aug 24, 2024Updated last year
- ☆12Feb 19, 2026Updated 2 weeks ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Malware Development☆10Sep 30, 2020Updated 5 years ago
- Raw BLE advertisement + sniffing tool (Linux)☆16Feb 5, 2024Updated 2 years ago
- Client library for 3X-UI API.☆16Feb 24, 2026Updated 2 weeks ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago