Fake currentTimeMillis() without class loader hacks
☆122Feb 18, 2021Updated 5 years ago
Alternatives and similar repositories for faketime
Users that are interested in faketime are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some xposed modules☆16Nov 27, 2018Updated 7 years ago
- st2-048☆40Jul 7, 2017Updated 8 years ago
- ☆14May 13, 2018Updated 7 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Linux AV tests☆13Apr 23, 2019Updated 6 years ago
- ☆18Oct 21, 2016Updated 9 years ago
- ☆19Jan 26, 2016Updated 10 years ago
- ☆21May 11, 2013Updated 12 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- ☆21Jan 18, 2018Updated 8 years ago
- Various Jeb plugins, including obfuscation restore☆15Jun 3, 2015Updated 10 years ago
- HLS OSMF plugin - help to view m3u8 streams in the KDP/V2 player☆14Nov 16, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- ☆45Apr 22, 2017Updated 8 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- Example packet.proxy plugins.☆22Jan 8, 2021Updated 5 years ago
- DNS log http://zone.wooyun.org/content/27119☆21May 10, 2016Updated 9 years ago
- Chrome 扩展,为百度搜索添加必应壁纸。☆11Jun 29, 2015Updated 10 years ago
- IDA PRO FLIRT signature files MSVC2017的sig文件☆14Apr 9, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆32Sep 14, 2017Updated 8 years ago
- A Modular Android Fuzzing Toolkit☆29Feb 13, 2016Updated 10 years ago
- ☆18Jun 23, 2017Updated 8 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Dec 14, 2018Updated 7 years ago
- ☆21Dec 20, 2012Updated 13 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- 一个攻击框架☆10May 29, 2015Updated 10 years ago
- DoS PoC's for SAP products☆51Jan 23, 2018Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A Generic Windows Memory Scraping Tool☆70Apr 20, 2017Updated 8 years ago
- Car Backdoor Maker☆220Oct 1, 2018Updated 7 years ago
- acunetix☆62Mar 27, 2020Updated 6 years ago
- ☆64Sep 5, 2017Updated 8 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- poc or exp of android vulnerability☆407Dec 30, 2017Updated 8 years ago
- Start method tracing using Android's internal APIs☆13Dec 25, 2017Updated 8 years ago