fawazahmed0 / Moodle-HackingView external linksLinks
Hack Moodle Exam
☆46Nov 14, 2022Updated 3 years ago
Alternatives and similar repositories for Moodle-Hacking
Users that are interested in Moodle-Hacking are comparing it to the libraries listed below
Sorting:
- basic script pulling ome.tv stranger ip, location and sending it to discord webhook☆11Aug 10, 2022Updated 3 years ago
- A High-Frequency Market-Making bot for CoinCheck.jp☆11Oct 30, 2017Updated 8 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- Ejercicios de SQL☆14Nov 29, 2025Updated 2 months ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Dec 31, 2020Updated 5 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Scripts that cover the basics of interacting with the Threat Grid API☆11Jan 21, 2020Updated 6 years ago
- best tool for hacking via windows cmd☆13Jan 4, 2019Updated 7 years ago
- Simple legit cheat☆12May 16, 2021Updated 4 years ago
- ☆11Jul 5, 2016Updated 9 years ago
- The OpenFISMA project is an open source application designed to reduce the complexity and automate the regulatory requirements of the Fed…☆10Apr 21, 2015Updated 10 years ago
- New Tool To Unlock Hc Files Decryptor for HTTP Custom configuration files (LAPSCA)☆14Feb 16, 2023Updated 2 years ago
- Documentación sobre sistemas embebidos☆12Nov 15, 2024Updated last year
- A conglomeration of resources for any color of the rainbow☆14Updated this week
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year
- Python program that auto buy and sell cryptocurrency based on a Telegram message.☆10Jan 28, 2021Updated 5 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Sep 11, 2025Updated 5 months ago
- Ome.tv IP Resolver with full informations☆18Mar 5, 2022Updated 3 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Jan 14, 2021Updated 5 years ago
- FTP-like interface over S3 to allow auth users (OAuth, SAML) manage files under some buckets and folders, with normal users and admins.☆11Oct 25, 2020Updated 5 years ago
- Actualizacion del generador de bin cc-genpro, con nuevas herramientas y mas sencillo de utilizar el generador de bin☆70Feb 25, 2023Updated 2 years ago
- Own linux scripts and configurations☆14Feb 12, 2025Updated last year
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- For use with fine-tuning, especially the current implementation of "Dreambooth".☆12Sep 24, 2022Updated 3 years ago
- Related Anime is a website used to discover all the different media related to anime series.☆12Jan 22, 2025Updated last year
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 6 years ago
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- Hash Checker Bypass and Process Hacker☆18Nov 14, 2021Updated 4 years ago
- ☆16Apr 26, 2021Updated 4 years ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Jul 8, 2020Updated 5 years ago
- 僕の自学の方法。Mi camino de aprendizaje autodidáctico. My programming self-study road.☆12Aug 13, 2025Updated 6 months ago
- A lookup tool created to explore the NJ Arrest file from the FBI. Created for Hack Jersey 2.0☆14Apr 1, 2015Updated 10 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago