☆25Jun 5, 2023Updated 2 years ago
Alternatives and similar repositories for Stalkerware
Users that are interested in Stalkerware are comparing it to the libraries listed below
Sorting:
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Feb 25, 2026Updated last week
- A collection of my (horribly organized, incomplete and unhelpful) notes for several challenge sites☆11Jun 29, 2016Updated 9 years ago
- CryptoChecker with bunch of features. Seedphrase checker, Metamask, Brave, Ronin, Binance Chain, Exodus, Atomic wallets. NFT & Airdrops c…☆36May 15, 2025Updated 9 months ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Sep 4, 2020Updated 5 years ago
- "Hacks" for online blooket games. Does not require outside information (ie. url, gamepin, sign in information) blooket hacks☆13Jan 25, 2024Updated 2 years ago
- NSA Codebreaker Challenge 2019 write-ups.☆21Jan 4, 2020Updated 6 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- ☆12Feb 26, 2026Updated last week
- https://bloxluck.com's source code, its a mm2 gambling website, make sure to set everything up in the php files, the owner exited, and he…☆10Sep 16, 2022Updated 3 years ago
- Flash USDT transaction (core network) is a software designed to enable you send fake USDT from any wallet address to another wallet addre…☆17Feb 24, 2024Updated 2 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Nov 8, 2021Updated 4 years ago
- Dark Blue is a set of tools designed to help teams better prepare for CyberPatriot competition rounds by trying to make it easy to create…☆16Jul 30, 2022Updated 3 years ago
- ☆15Feb 24, 2026Updated last week
- Tools for Sketchware☆12Aug 27, 2020Updated 5 years ago
- Monte Carlo password checking☆11Aug 14, 2017Updated 8 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- AxSpy is an application who allow you to monitoring an Android phone for free. Ideal for parents who want to keep an eye on their childre…☆10Dec 10, 2013Updated 12 years ago
- ☆12Mar 31, 2025Updated 11 months ago
- crypto currency gambling casino game using REACT☆10Jun 14, 2021Updated 4 years ago
- Fix missing Linux firmware kernel modules!☆17Jan 1, 2024Updated 2 years ago
- ☆10Mar 27, 2025Updated 11 months ago
- Research into creating tiny .NET executables☆14Apr 21, 2018Updated 7 years ago
- post-quantum email encryption with CodeCrypt☆11Feb 23, 2018Updated 8 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Логотипы различных дистрибутивов GNU/Linux. Список будет пополняться☆10Mar 17, 2023Updated 2 years ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Dec 13, 2025Updated 2 months ago
- SOAP is a free, online tool aimed at enabling civil society organisations and activist groups to build security policies that work for th…☆16Mar 23, 2024Updated last year
- Alfred is a advanced OSINT information gathering tool☆11Nov 14, 2025Updated 3 months ago
- Collection of misc (mostly JTAG and Serial Wire Debug) adapters.☆13Dec 13, 2017Updated 8 years ago
- Javascript Slippy Map Library☆14Sep 25, 2017Updated 8 years ago
- Spy on your friend Android App☆12Feb 13, 2017Updated 9 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Lets you reorganize videos in your watch later list to various playlists (for watch later hoarders like me!)☆10Feb 12, 2015Updated 11 years ago
- Parse content from nsfw.xxx☆20Jan 3, 2024Updated 2 years ago
- Security Lab☆13Jun 5, 2023Updated 2 years ago
- Platform for sharing complex information about security forces. Powers WhoWasInCommand.com☆10Mar 1, 2024Updated 2 years ago
- ☆12Apr 6, 2017Updated 8 years ago
- CLI Tools to open, extract and mount FTK Imager's AccessData AD1 forensic images on linux.☆17May 27, 2025Updated 9 months ago