☆12Apr 20, 2025Updated 11 months ago
Alternatives and similar repositories for Youtube_C2
Users that are interested in Youtube_C2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- It's a food delivery app built with Flutter & Dart in my new course☆15May 28, 2023Updated 2 years ago
- It's a quiz app built with Flutter & Dart in my new course☆12Jul 12, 2024Updated last year
- A multi-target URL bruteforcer☆22Aug 6, 2018Updated 7 years ago
- Markup world map made with Raphael☆19Apr 28, 2017Updated 8 years ago
- A way to control devices via Bluetooth w/ an ESP32☆14Jul 6, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Quotes Maker (quotesmaker.py) is a python based quotes to image converter. You can convert either one quote or pass a file containing quo…☆12Sep 8, 2020Updated 5 years ago
- ☆28Oct 15, 2025Updated 5 months ago
- A PlayBook for OSWP & Wireless Pentest☆47Jul 28, 2024Updated last year
- kumpulan project pembuatan shell backdoor☆11Oct 21, 2017Updated 8 years ago
- Google Dork Scanner for Google Chrome Extension☆17May 10, 2025Updated 10 months ago
- This is a framework for web penetration testers and web developers☆12Apr 15, 2023Updated 2 years ago
- ☆19Mar 25, 2025Updated last year
- ☆11Aug 18, 2023Updated 2 years ago
- Python tools for Quantum AI Crypt☆12Sep 21, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- slides for hardware hacking course produced by security society channel i introduce☆14Dec 29, 2021Updated 4 years ago
- ☆13Jul 23, 2023Updated 2 years ago
- A set of Python tools useful for cryptography and cryptanalysis.☆14Feb 3, 2017Updated 9 years ago
- ☆16Mar 3, 2025Updated last year
- This project showcases how to exploit vulnerabilities in NFC cards using Arduino and RFID technology. By leveraging the MFRC522 RFID modu…☆16Jul 4, 2023Updated 2 years ago
- CyberTalents Blue Team Scholarship 2023 By Trend Micro☆12Sep 28, 2023Updated 2 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- NMAP with LLM summaries☆16Jan 15, 2024Updated 2 years ago
- Convert all valid keys from flipperzero-goodies to rfid/ibutton fuzzer format☆17Jul 30, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Archived Please go to https://github.com/adamjsturge/xsshunter-go☆31Mar 7, 2024Updated 2 years ago
- SVG Images with XSS in them☆17Oct 5, 2023Updated 2 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Python Penetration Testing Tools☆17Jul 19, 2025Updated 8 months ago
- ☆19Dec 15, 2025Updated 3 months ago
- ☆25Feb 10, 2026Updated last month
- ☆13Jul 13, 2024Updated last year
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Tool built with GPTScript in mind to generate images☆21Aug 11, 2024Updated last year
- Automation for Open Threat Exchange☆24Mar 16, 2024Updated 2 years ago
- call a contact by his/her name or part of number, or just show the contact on the green console ;)☆16Sep 13, 2018Updated 7 years ago
- Extensible MacOS system telemetry generator.☆55Mar 1, 2026Updated 3 weeks ago
- ☆18Nov 25, 2025Updated 4 months ago
- this module will automatically create evil twin and store password that user input☆15Jan 26, 2023Updated 3 years ago
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆63Mar 11, 2026Updated 2 weeks ago