☆433Nov 23, 2023Updated 2 years ago
Alternatives and similar repositories for Zydra
Users that are interested in Zydra are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SSH Reverse Tunnels with Login Notifications via Telegram Bot☆31Feb 22, 2023Updated 3 years ago
- Convert any binary data to a PNG image file and vice versa.☆134Dec 25, 2023Updated 2 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- ☆31Jul 14, 2022Updated 3 years ago
- A console utility to bring up new Tor nodes easily☆23May 7, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- HDDSuperClone, HDDSuperTool☆415Mar 31, 2026Updated 3 weeks ago
- This is a soft fork of the Megalodon app, which itself is a fork of the official Mastodon Android app.☆14Jan 27, 2023Updated 3 years ago
- Firewall module using Netfilter kernel framework hook functions☆11May 20, 2022Updated 3 years ago
- A zero knowledge messaging system built on zcash.☆40May 18, 2021Updated 4 years ago
- An Android App that can be used as laptop touchpad via local Network☆189Mar 1, 2026Updated last month
- Recieve raw network trafic dump in pcap-format and parse it to squid-proxy log. Then generate report for lightsquid and shows it in Web U…☆89Apr 12, 2023Updated 3 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in C.☆178Aug 16, 2024Updated last year
- ☆128May 22, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Tracking history of USB events on GNU/Linux☆1,182Oct 3, 2022Updated 3 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- If you want know, who use your computer when you are not nearby!☆48Sep 30, 2021Updated 4 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Let's find someone's account☆171Jun 13, 2019Updated 6 years ago
- Automatically fix high dynamic range images☆48Jul 21, 2023Updated 2 years ago
- 📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-de…☆1,555Jun 27, 2022Updated 3 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- A Python Brute-Force Compressed Password Cracker☆295Dec 12, 2025Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Turn images into sounds viewable on a spectrogram!☆159Jan 21, 2020Updated 6 years ago
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆273Mar 24, 2021Updated 5 years ago
- Advanced Hash Manipulation☆176Oct 14, 2019Updated 6 years ago
- Simple tool to visualize and amplify mouse movements☆75May 12, 2021Updated 4 years ago
- Local file inclusion exploitation tool☆949Oct 1, 2025Updated 6 months ago
- File encryption done right☆36Mar 8, 2026Updated last month
- Kal El Network Stress Test and Penetration Testing Toolkit☆54Mar 11, 2024Updated 2 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆534Mar 27, 2022Updated 4 years ago
- Yet another python sms library☆93Nov 22, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Run scripts for each Linux desktop notification.☆15Jul 8, 2022Updated 3 years ago
- Scripts for pentesting/hacking☆18Jan 22, 2022Updated 4 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆142Apr 29, 2019Updated 7 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆164Aug 21, 2019Updated 6 years ago
- ☆17Mar 21, 2019Updated 7 years ago
- Free speech to text☆134Dec 1, 2023Updated 2 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆642May 8, 2024Updated last year