cornernote / autoit-poker_bot
AutoIt script that attempts to fully automate the process of playing texas-holdem poker.
☆12Updated 3 years ago
Alternatives and similar repositories for autoit-poker_bot:
Users that are interested in autoit-poker_bot are comparing it to the libraries listed below
- DKMC - Dont kill my cat - Malicious payload evasion tool☆20Updated 7 years ago
- ☆22Updated 6 years ago
- API Tracker by Cysinfo Team☆22Updated 8 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 9 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- Misc resources for my daily pentesting...☆18Updated 9 months ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆16Updated 6 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- My solutions for random crackmes and other challenges☆11Updated 5 years ago
- Extract unencrypted SSH keys from pageant memory dump☆16Updated 9 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated last year
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- Security Logon Event Analysis Tools - a collection of scripts for collecting, parsing, and analyzing logon events from Windows Security L…☆16Updated 8 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago
- Basic file metadata gathering script☆21Updated 3 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- ☆15Updated 3 years ago
- Fuzzing Framework☆10Updated 7 years ago
- ☆24Updated 6 years ago
- lkm rootkit☆15Updated 10 years ago
- Notes about reverse engineering the Petya2017 ransomware☆18Updated 7 years ago
- A fast python tool for creating permutations of alphanumerics☆11Updated 4 years ago
- Discover MSSQL Instances via UDP Scanning