☆14May 23, 2018Updated 7 years ago
Alternatives and similar repositories for THP1-2_Updates
Users that are interested in THP1-2_Updates are comparing it to the libraries listed below
Sorting:
- ☆209Sep 15, 2018Updated 7 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 20, 2026Updated last week
- Arduino project for controlling digital WWA LED strips to act as car DRL and sequential turn signals.☆12Apr 27, 2018Updated 7 years ago
- ☆42Apr 20, 2018Updated 7 years ago
- SSID logger - an Android app for position tracking, target to logging without GPS/network access and low battery usage☆10Sep 18, 2015Updated 10 years ago
- ChatSecure for OS X☆12Mar 27, 2017Updated 8 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- SOAP is a free, online tool aimed at enabling civil society organisations and activist groups to build security policies that work for th…☆16Mar 23, 2024Updated last year
- PoC of BitcoinCore Denial-Of-Service and DoubleSpending☆10Nov 12, 2018Updated 7 years ago
- Don't let *them* read your mail. Encrypt it now.☆18Jun 13, 2018Updated 7 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- post-quantum email encryption with CodeCrypt☆11Feb 23, 2018Updated 8 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- Platform for sharing complex information about security forces. Powers WhoWasInCommand.com☆10Mar 1, 2024Updated 2 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- Music Player Daemon monitoring☆10Feb 3, 2015Updated 11 years ago
- An unofficial Humax IR4000HD terminal client with enhanced features.☆10Feb 2, 2019Updated 7 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- Understand your Zotero library☆15Dec 25, 2025Updated 2 months ago
- ☆12Jun 29, 2021Updated 4 years ago
- A library to parse Wayback Machine of archive.org to get a historical views of web pages. It is a useful tool to research on the evolutio…☆20Dec 22, 2018Updated 7 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆11Jan 10, 2020Updated 6 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- ☆11Dec 21, 2016Updated 9 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- Busted. With duct tape, spit and tears. Brought to you by beer.☆12Nov 4, 2021Updated 4 years ago
- NodeRED made for balena☆13Jun 1, 2021Updated 4 years ago
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated last month
- A realistic windows testlab deployment tool☆12Feb 24, 2017Updated 9 years ago
- Scripts used in our HackWest Pros vs Joes event☆14Mar 26, 2018Updated 7 years ago
- Spark MLib Training Models for Network Security☆16Mar 19, 2018Updated 7 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- Neil Bauers' Microprocessor Simulator for Students☆15Apr 26, 2014Updated 11 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- ☆18Feb 19, 2025Updated last year
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago