☆13Aug 1, 2017Updated 8 years ago
Alternatives and similar repositories for FlexiSpyPOC
Users that are interested in FlexiSpyPOC are comparing it to the libraries listed below
Sorting:
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Feb 25, 2026Updated last week
- ☆11Apr 16, 2016Updated 9 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆20Jan 15, 2020Updated 6 years ago
- Source code RDPUploader☆19Dec 27, 2018Updated 7 years ago
- ☆22Oct 13, 2017Updated 8 years ago
- Proof-of-Concept exploits for D-Link DIR8xx routers☆37Sep 12, 2017Updated 8 years ago
- NFC☆27Aug 4, 2023Updated 2 years ago
- "Hacks" for online blooket games. Does not require outside information (ie. url, gamepin, sign in information) blooket hacks☆13Jan 25, 2024Updated 2 years ago
- Various tools to track the Mirai botnet☆20Nov 3, 2016Updated 9 years ago
- Backdoor with Golang (Cross-Plateform)☆17Feb 17, 2022Updated 4 years ago
- rfcat port for the 900MHz Explorer board☆27Dec 19, 2016Updated 9 years ago
- Passive-Recursive DNS daemon☆26Sep 20, 2024Updated last year
- A sample IoT bot origin from Mirai☆20Mar 29, 2017Updated 8 years ago
- Immunio's XSS Fuzzer tool☆25Dec 15, 2015Updated 10 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67May 27, 2018Updated 7 years ago
- Framework for static and dynamic analysis in Android APKs☆32Jul 25, 2017Updated 8 years ago
- Penetration Test Vulnerabilities Manager is an extension for Burp Suite, written in Jython. It was developed by Barak Tawily in order to …☆31Jul 25, 2021Updated 4 years ago
- [unmaintained] Post-exploitation tool☆181Jan 28, 2016Updated 10 years ago
- php imagecreatefrom* functions☆31Feb 27, 2017Updated 9 years ago
- OWASP Skanda - SSRF Exploitation Framework☆38Jul 6, 2013Updated 12 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆34Sep 22, 2017Updated 8 years ago
- https://bloxluck.com's source code, its a mm2 gambling website, make sure to set everything up in the php files, the owner exited, and he…☆10Sep 16, 2022Updated 3 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- SpinSight Roulette AI Is a powerful machine-learning model trained on thousands of hours of Roulette gameplay, analyzes real-time ball tr…☆17Jul 1, 2025Updated 8 months ago
- Flash USDT transaction (core network) is a software designed to enable you send fake USDT from any wallet address to another wallet addre…☆17Feb 24, 2024Updated 2 years ago
- A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP☆10Dec 16, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Collection of IDA scripts☆42Sep 20, 2017Updated 8 years ago
- Implementation of BadUSB written in Python☆35Oct 4, 2017Updated 8 years ago
- IDA Pro Scripts☆37Feb 24, 2015Updated 11 years ago
- DoS PoC's for SAP products☆51Jan 23, 2018Updated 8 years ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆15Oct 25, 2017Updated 8 years ago
- Tools for Sketchware☆12Aug 27, 2020Updated 5 years ago
- Code for the Arduino-based BadUSB inspired from the legendary Rubber Ducky from Hak5☆11Feb 28, 2023Updated 3 years ago
- Deep learning-based audio spoofing attack detection experiments for speaker verification.☆14Apr 20, 2023Updated 2 years ago
- PillDucky is similar to "Hak5's Rubber Ducky" but for STM32 boards.☆15Jul 27, 2021Updated 4 years ago
- Kickstart your Algorand dApp in minutes. Full-stack TypeScript template with wallet connect, payments, NFT minting, token creation, and s…☆56Nov 17, 2025Updated 3 months ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago