☆96Feb 1, 2018Updated 8 years ago
Alternatives and similar repositories for mac
Users that are interested in mac are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Configure an LDAPS Endpoint for Simple AD☆14Aug 29, 2017Updated 8 years ago
- Chromiux is a python based console app that extracts the encrypted saved passwords/cookies in txt format of chrome browser.☆19May 14, 2021Updated 4 years ago
- ☆16Jun 16, 2021Updated 4 years ago
- allows booting installed wii channels from wii vc☆13Oct 3, 2017Updated 8 years ago
- ☆21May 14, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Tool for Optimization and Group-structure Analysis of nuclear multi-group cross sections☆11Oct 20, 2022Updated 3 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Jul 27, 2019Updated 6 years ago
- Tool to list/extract/update contents of CRIWARE's CPK archive format.☆11Apr 29, 2015Updated 10 years ago
- Spot all domain controllers in a Microsoft Active Directory environment. Find computer name, FQDN, and IP address(es) of all DCs.☆20Jun 23, 2024Updated last year
- ☆13Nov 17, 2021Updated 4 years ago
- A go rewrite of PPPwn☆10May 20, 2024Updated last year
- Decompress, Extract, Repack and Compress RARC archives with Yaz0 compression.☆13Mar 31, 2020Updated 6 years ago
- ☆18May 11, 2023Updated 2 years ago
- Python3 Scripts for OSCP buffer overflow exploitation☆12May 12, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Fully Functional MS17-10 EternalBlue Exploit Written in C++ on windows for windows☆14Sep 6, 2020Updated 5 years ago
- ☆13Jul 8, 2020Updated 5 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Mar 26, 2026Updated 2 weeks ago
- The package for producing gamma spec from nuclide activities☆13Jan 16, 2025Updated last year
- ☆10Apr 2, 2026Updated last week
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- ☆16Sep 2, 2022Updated 3 years ago
- ☆27Mar 9, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- XSPlot - Neutron cross section plotter for isotopes☆14Jun 26, 2023Updated 2 years ago
- Shows CPUID features and instruction encodings used by x86/x64 binaries☆18Jan 2, 2026Updated 3 months ago
- execute shell scripts among multiple ssh servers☆13Aug 23, 2024Updated last year
- Character encoding auto-detection. Ruby 1.9 compatible☆33Feb 2, 2018Updated 8 years ago
- "Computers are great because when you're working with them you get immediate results that let you know if your program works. It's feedba…☆142Oct 22, 2019Updated 6 years ago
- crc32 implementation in a myriad of languages.☆10Apr 23, 2015Updated 10 years ago
- A list of webshells☆17Jul 1, 2023Updated 2 years ago
- PHP Vulnerability Hunter (fork)☆12May 8, 2015Updated 10 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Innovate with okd.io☆10Jan 25, 2024Updated 2 years ago
- Exemplo de currículo em Markdown e como convertê-lo para PDF☆11Jun 2, 2023Updated 2 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- VMWare vRealize SSRF-CVE-2021-21975☆14Apr 2, 2021Updated 5 years ago
- Fork from the v4.1d1 branch of Mulberry Mail. THIS REPOSITORY IS NO LONGER ACTIVELY MAINTAINED. Unfortunately I lack the time to longer m…☆18Jan 10, 2016Updated 10 years ago
- Production Ready Terraform☆23Jun 22, 2022Updated 3 years ago
- ☆14Dec 15, 2020Updated 5 years ago