amit-bhandari / Instant-Wallpaper-ChangerView external linksLinks
Quickly change wallpaper by typing couple words
☆18Feb 7, 2019Updated 7 years ago
Alternatives and similar repositories for Instant-Wallpaper-Changer
Users that are interested in Instant-Wallpaper-Changer are comparing it to the libraries listed below
Sorting:
- Position and velocity PID control of a DC motor using LabView and Arduino☆15Apr 23, 2018Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Jul 29, 2016Updated 9 years ago
- My presentations from different conferences☆15Sep 12, 2018Updated 7 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆14Mar 4, 2017Updated 8 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆19Jan 13, 2022Updated 4 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 8 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49May 16, 2017Updated 8 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Apr 14, 2017Updated 8 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago
- Tool to automatic leak information using Hacking with engine searches☆93May 9, 2018Updated 7 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Aug 23, 2019Updated 6 years ago
- Cheat sheet and notes inspired by the book RTFM - Red Team Field Manual☆187Jun 23, 2024Updated last year
- Detect and prevent KRACK attacks in your network☆183Oct 20, 2017Updated 8 years ago
- An automated Wireless RogueAP MITM attack framework.☆186May 9, 2019Updated 6 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225May 8, 2021Updated 4 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆246Oct 22, 2021Updated 4 years ago
- An Bash&Python Script For Generating Payloads that Bypasses All Antivirus so far [FUD]☆293Sep 9, 2018Updated 7 years ago
- Python framework for IT security tools☆268Jan 28, 2017Updated 9 years ago
- websites vulnerability scanner for termux☆312Oct 1, 2020Updated 5 years ago
- A Powershell Privilege Escalation Enumeration Script.☆316Mar 14, 2018Updated 7 years ago
- GitHub Project Resource List☆371Sep 2, 2016Updated 9 years ago
- Red Team Tactics, Techniques, and Procedures☆420Feb 4, 2026Updated last week
- Nano is a family of PHP web shells which are code golfed for stealth.☆445Feb 18, 2020Updated 5 years ago
- Tricks for penetration testing☆581Updated this week
- Blueborne CVE-2017-0785 Android information leak vulnerability☆472Sep 23, 2017Updated 8 years ago
- JShell - Get a JavaScript shell with XSS.☆532May 5, 2019Updated 6 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆527Jun 26, 2021Updated 4 years ago
- The hackers tool belt☆521Aug 6, 2018Updated 7 years ago
- collection of articles/books about programing☆585Dec 20, 2023Updated 2 years ago
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 4 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆638Jul 16, 2023Updated 2 years ago
- Computer vision based ML training data generation tool☆608Feb 15, 2025Updated last year
- A collection of useful Python hacking scripts for beginners☆615Jan 22, 2022Updated 4 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆724Dec 26, 2022Updated 3 years ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆750Apr 12, 2022Updated 3 years ago
- Automatically Launch Google Hacking Queries Against A Target Domain☆740Mar 5, 2024Updated last year
- A curated list of practical business machine learning (BML) and business data science (BDS) applications for Accounting, Customer, Employ…☆809Oct 4, 2024Updated last year