A simple tool to manipulate window objects in Windows
☆45Dec 22, 2016Updated 9 years ago
Alternatives and similar repositories for winmanipulate
Users that are interested in winmanipulate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- ☆12May 9, 2017Updated 8 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Any code for preparing for OSCE☆12Oct 31, 2017Updated 8 years ago
- An intentionally designed broken web application based on REST API☆13May 25, 2022Updated 3 years ago
- A tool to calculate big numbers, perform hashing and encodings.☆19May 29, 2017Updated 8 years ago
- ☆18Jan 9, 2025Updated last year
- Bunch of techniques potentially used by malware to detect analysis environments☆160Jul 4, 2016Updated 9 years ago
- Simple ways to 0wn simple IOT devices☆65Mar 27, 2015Updated 11 years ago
- SSH brute forcer tool and library, using AsyncIO of Python 3.4☆36May 27, 2020Updated 5 years ago
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- Wiki for Pentesting iOS apps☆27Jul 23, 2025Updated 8 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51May 3, 2016Updated 9 years ago
- test SSL/TLS clients how secure they are☆26Apr 9, 2021Updated 5 years ago
- ☆17Feb 17, 2022Updated 4 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Oct 18, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- Source code of AppleCheats.cc (Valorant).☆10Aug 28, 2020Updated 5 years ago
- RFD Checker - security CLI tool to test Reflected File Download issues☆64Feb 26, 2019Updated 7 years ago
- Mobile Security - OMTG-Android Walkthrough☆11Oct 31, 2019Updated 6 years ago
- A quick POC on how to embed a meterpreter in Firefox via DLL hijacking☆17Jul 6, 2017Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Mar 1, 2019Updated 7 years ago
- Cloud metadata extraction tools and scripts☆34May 22, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Wordlist to get files/ folders listed by the app that may expose passwords, sensitive file or folders☆22Jul 10, 2020Updated 5 years ago
- Just lists of lists of lists !☆17Oct 13, 2025Updated 6 months ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Nov 15, 2019Updated 6 years ago
- vulnerable single sign on☆150Aug 1, 2024Updated last year
- sqlmap tamper script for unicode escape inside json☆14Dec 20, 2018Updated 7 years ago