interactive web application illustrating rapid expansion in “dark money” funding, a trend that has grown ~1000% since 2012 in the United States Congress.
☆18Nov 14, 2017Updated 8 years ago
Alternatives and similar repositories for dark-money
Users that are interested in dark-money are comparing it to the libraries listed below
Sorting:
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 9 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- ☆10Mar 31, 2016Updated 9 years ago
- Facebook Graph API for .Net☆30Apr 10, 2023Updated 2 years ago
- ☆10Jul 24, 2017Updated 8 years ago
- A kernel module to read/write QFPROM rows on Qualcomm SoC devices with TCP server support.☆15Mar 30, 2016Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- eqgrp-auction decrypted☆13Apr 15, 2017Updated 8 years ago
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 8 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- My attempt at predicting Powerball numbers with nodejs☆10Jul 6, 2016Updated 9 years ago
- D-RAT [VB.NET]+[MySQL]+[PHP]☆15Jun 10, 2020Updated 5 years ago
- Some concept code for bypassing the Android lock screen from recovery mode☆16Mar 28, 2011Updated 14 years ago
- Decrypt Nanocore RAT configuration☆10Mar 11, 2017Updated 9 years ago
- Botnet (Zombie Networks) with C# and Web Socket☆15Jul 8, 2014Updated 11 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Jan 15, 2015Updated 11 years ago
- machinelearning stuff☆13Nov 2, 2017Updated 8 years ago
- Sise supplicant exploit kit -- 华软蝴蝶漏洞利用工具包..☆14Mar 11, 2016Updated 10 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- Notes about reverse engineering the Petya2017 ransomware☆20Jul 6, 2017Updated 8 years ago
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- 🀄️ WebShell Backdoor Framework☆16Jun 7, 2018Updated 7 years ago
- A RAT, script that controls other pcs remotly, for educational purposes only☆13Jun 18, 2024Updated last year
- Peer to Peer Payments via NFC - Built for IC Hack 2014☆10Dec 19, 2016Updated 9 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- A web tool to scan multiple Bitcoin accounts for funds and send them to a new account☆10Dec 26, 2016Updated 9 years ago
- ☆10Aug 13, 2018Updated 7 years ago
- Analizador de tráfico para dispositivos Android potencialmente comprometidos como parte de una botnet orientado a detectar ataques DDoS.☆13Jun 20, 2018Updated 7 years ago
- Python wrapper for gatttool from BlueZ to access Bluetooth LE Devices☆12Nov 13, 2015Updated 10 years ago
- DBC files for many different cars☆12May 3, 2018Updated 7 years ago
- Hackerspace Access Control and Check in System☆12Jul 20, 2016Updated 9 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- The leader in true open source email and collaboration☆12Jun 21, 2016Updated 9 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 7 years ago
- Override factory brightness settings with ROOT Access [Android]☆14May 15, 2023Updated 2 years ago
- BlackWorm SRC Extract☆16Dec 24, 2016Updated 9 years ago