carlssonemil / nebulaLinks
Simple, lightweight & intuitive camouflage tracker for Call of Duty: Black Ops 6 (2024)
☆18Updated this week
Alternatives and similar repositories for nebula
Users that are interested in nebula are comparing it to the libraries listed below
Sorting:
- My attempt to replicate TARS from Interstellar☆19Updated last week
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- Build your own cloud virtual machine lab☆12Updated this week
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆15Updated last year
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Tools and dumps related to the Smishing Triad and the USPS smishing campaign from late 2023 into 2024☆11Updated last year
- Open YARA scan- and search engine☆25Updated 9 months ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Updated 12 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago
- Generic Makefile Template with Automatic Dependency Generation☆11Updated 4 years ago
- Maltego integration of https://abusix.com☆17Updated 7 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13Updated 8 years ago
- ☆11Updated 2 years ago
- Get a number of your tweets from the Twitter API.☆10Updated 3 years ago
- Dockerised Version of Frida☆21Updated 2 years ago
- Random Tips and Writeups.☆15Updated 6 years ago
- Find RSA primes in files☆20Updated 3 years ago
- This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the …☆18Updated last year
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- ☆14Updated last year
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆18Updated 4 years ago
- Free Email Providers☆11Updated 2 years ago
- Visualize BBOT scans in realtime with VivaGraphJS☆57Updated last year
- Various exploits☆10Updated 8 years ago
- iWar - The intelligent war dialer.☆28Updated 5 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated 2 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆13Updated 2 years ago
- A Reverse Engineering Assistant leveraging Retrieval-Augmented Generation (RAG) and the LLaMA-3.1-8B-Instant Large Language Model (LLM). …☆36Updated last year
- Cryptographic Dataset Generation & Modelling Framework☆39Updated 5 years ago