Уг хэсэгт миний унших дуртай таньд хэрэг болох номнуудыг оруулах болно 🧠
☆14Apr 19, 2025Updated last year
Alternatives and similar repositories for My-Favourite-Books
Users that are interested in My-Favourite-Books are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- HACK ATM MACHINES NEAREST TO YOU AND BECOME RICH!!! You can hack and break into a bank’s security ATM Machine without carrying guns or an…☆19Sep 14, 2016Updated 9 years ago
- A set of AuToMation scripts for hacking.☆11Jan 5, 2022Updated 4 years ago
- This is a repository of the source code of various malware targeting the *nix (mostly Linux) operating systems.☆16Oct 15, 2016Updated 9 years ago
- malware for ATM☆15Oct 25, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Turn table into subfigure. More or less a hack atm, easy to incorporate to org-mode though☆21Feb 13, 2021Updated 5 years ago
- Hack for RUHacks☆19May 27, 2018Updated 7 years ago
- Scripts for car hack on nitro type☆29Feb 28, 2024Updated 2 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- Jackpot is the easiest way to get paid using ruby.☆78Aug 24, 2013Updated 12 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- Talk2Me interacts with OpenAI's language model to generate text responses and saves the conversation for future reference.☆16Sep 6, 2024Updated last year
- Open source CIA installer for the 3DS.☆32Apr 1, 2015Updated 11 years ago
- Advanced Android and System Hacking Tool . This tool used for some Cyber Attacks in System This Tool used for educational purpose and Thi…☆35Apr 14, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 3 years ago
- ATM Hacking with Minigame for QBCore Framework☆38Jan 13, 2023Updated 3 years ago
- This repo contains deobfuscated files of the Redline malware code which was behind the The recent Github Account hacks and stealing sensi…☆15Sep 18, 2024Updated last year
- Soft and Hard Unlocks everything in Combat Master all using melon loader☆12Sep 11, 2024Updated last year
- A neural network library for natural language processing written in pure Clojure☆10Jul 30, 2018Updated 7 years ago
- demo material for my PowerShell Scripting Secrets presentation☆15Nov 20, 2017Updated 8 years ago
- Gophish companion script for sms phishing.☆19Dec 10, 2019Updated 6 years ago
- Basic password cracker. These tools can be used to crack various types of password hashes, the program applies the technique to recover t…☆10Mar 22, 2023Updated 3 years ago
- Second Edition Metasploit For Termux☆21Apr 9, 2026Updated last month
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Exploiting Software-Defined Radio - Common attacks and a device to exploit them (Proof of Concept).☆17Jan 12, 2021Updated 5 years ago
- Some Python to process the Wikileaks Cablegate data.☆19Nov 30, 2010Updated 15 years ago
- Open Redirect Vulnerability Payload List☆11Feb 23, 2021Updated 5 years ago
- Installer for Kiosk Mode applications that sets lock mode.☆12Jan 28, 2021Updated 5 years ago
- You can get cc from hear coded by cyber kallan☆19Nov 7, 2019Updated 6 years ago
- This is the app is made to hack ATM card trust wallet address withdraw and online assess☆14Oct 27, 2022Updated 3 years ago
- how to hack pattern lock☆15Dec 27, 2020Updated 5 years ago
- It has been developed in order to facilitate the use of ready-made Brute Force tools in Kali-Linux operating systems and is written in Py…☆16Nov 16, 2020Updated 5 years ago
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆10Sep 12, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Exim transport_filter python script that puts a user's RID value where a macro can see it for GoPhish attachment phishing tests☆21Jul 19, 2021Updated 4 years ago
- A web app that unlocks/bypasses password-protected excel file☆13Mar 16, 2024Updated 2 years ago
- DEF CON Hacker Tracker☆14Jul 30, 2025Updated 9 months ago
- The Source Code for the 31 Days of Windows 8☆61Dec 14, 2012Updated 13 years ago
- Serverless prisma2 example with auth and subscriptions*☆15Jan 24, 2023Updated 3 years ago
- Lateralus is terminal based phishing campaign tool☆28Feb 25, 2023Updated 3 years ago
- AxSpy is an application who allow you to monitoring an Android phone for free. Ideal for parents who want to keep an eye on their childre…☆11Dec 10, 2013Updated 12 years ago