Login application with password encryption
☆15Dec 20, 2023Updated 2 years ago
Alternatives and similar repositories for Login-System
Users that are interested in Login-System are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- Applications & Tools developed in Python☆37Mar 9, 2026Updated last month
- osu! cursor dancing with highest possible scores on 2B maps.☆12Oct 25, 2018Updated 7 years ago
- an efficient feature complete C++ bittorrent implementation☆14Apr 1, 2026Updated last week
- Nano Scraper, the next-generation web scraper!☆10Jan 23, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- my knowledge of linux privilege escalation☆11Oct 14, 2023Updated 2 years ago
- ☆13Apr 16, 2021Updated 4 years ago
- A bot trained on your WhatsApp chats☆13May 27, 2022Updated 3 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- A web application built on flask. Using the Spotify API, the application accesses user's playlists and they can download the playlist as …☆13May 16, 2024Updated last year
- If you read this, you lost The Game☆12Sep 29, 2024Updated last year
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Malicious scripts made for testing purposes, use it legally!☆39Jan 10, 2024Updated 2 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- GitHub Profile Repository for Kali☆14Apr 4, 2026Updated last week
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- A python program to exploit android through ADB☆17Apr 30, 2021Updated 4 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- a Netflix Checker made with Selenium☆22Nov 25, 2020Updated 5 years ago
- Machine Learning & Neural Network projects in Python☆16Jan 9, 2024Updated 2 years ago
- Show Twitch chat messages as subtitles when watching Twitch Live with mpv.☆26Mar 3, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Use onlinehashcrack.com api with python to crack rar,zip,cap,docx etc.. 20 million+ wordlist and hybrid bruteforce.☆19Mar 17, 2021Updated 5 years ago
- ☆23Mar 3, 2020Updated 6 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Minecraft accounts checker (Mojang).☆13Jul 4, 2024Updated last year
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- minimalist sudo alternative: multi-user privilege escalation tool in three letters☆10Jul 5, 2022Updated 3 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 9 months ago
- ☆26Oct 13, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆12Jul 14, 2023Updated 2 years ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 18, 2020Updated 5 years ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 4 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago