☆25Jun 5, 2023Updated 2 years ago
Alternatives and similar repositories for Stalkerware
Users that are interested in Stalkerware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Apr 16, 2026Updated 2 weeks ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- A collection of my (horribly organized, incomplete and unhelpful) notes for several challenge sites☆12Jun 29, 2016Updated 9 years ago
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆14Jan 18, 2020Updated 6 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- Exploring retweets by Twitter bot-nets.☆11Aug 30, 2017Updated 8 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Sep 4, 2020Updated 5 years ago
- Hunt malware with Volatility☆51Mar 3, 2026Updated 2 months ago
- Local Maltego Transforms for crt.sh☆12Sep 8, 2017Updated 8 years ago
- ☆38Jan 3, 2022Updated 4 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Dec 5, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Small Rust programs that do weird things☆30Feb 13, 2026Updated 2 months ago
- ☆19Sep 21, 2020Updated 5 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Small App for reading from MHN's hpfeeds broker and writing splunk logs☆10Sep 30, 2019Updated 6 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆100Aug 7, 2020Updated 5 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆16Apr 27, 2021Updated 5 years ago
- Various analysis of Android stalkerware☆118Apr 24, 2020Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆14Mar 31, 2026Updated last month
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 9 months ago
- Search for URLs in files (optionally limited by extension) and validate their HTTP status code☆24Mar 24, 2020Updated 6 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- Nmap Script to scan for Winnti infections☆71May 22, 2018Updated 7 years ago
- Deploy a honeypot and a crypto currency miner together, so sweet.☆17Aug 12, 2018Updated 7 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- SSH & Basic Web Applications brute-forcing attempts are visible in your mailbox with this tool.☆19Jan 9, 2020Updated 6 years ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆180Updated this week
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Squirtle the Browser-based NTLM Attack Toolkit☆16Apr 13, 2015Updated 11 years ago
- Repo for my scripts that I've made for work done, not all are functional, some are abandoned or WIP.☆10Jan 9, 2026Updated 3 months ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- Don't let *them* read your mail. Encrypt it now.☆18Jun 13, 2018Updated 7 years ago
- Lets you reorganize videos in your watch later list to various playlists (for watch later hoarders like me!)☆10Feb 12, 2015Updated 11 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago