☆54Mar 24, 2026Updated this week
Alternatives and similar repositories for norecognition
Users that are interested in norecognition are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scapy Penetration testing scripts☆21May 26, 2015Updated 10 years ago
- Interract with Microsoft SQL Server (MS SQL | MSSQL) servers and their linked instances in restricted environments, without the need for …☆57Mar 11, 2026Updated 2 weeks ago
- a signature verifying command interpreter☆11Mar 8, 2026Updated 3 weeks ago
- ☆11Oct 25, 2021Updated 4 years ago
- Forgotten Developer - a terminal like theme for Frontity.☆11Jun 6, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Parse odds from Bet365☆11Dec 2, 2017Updated 8 years ago
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 5 months ago
- A brookshear virtual machine written in Go☆10Sep 5, 2019Updated 6 years ago
- Filesystem interaction via firebeam virtual machine execution☆42Mar 14, 2026Updated 2 weeks ago
- TInySA sources to create an Arduino version of the tinySA☆29Jul 24, 2020Updated 5 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 7 months ago
- Backport of SliverStager to work with DotNetToJScript for vba☆17Aug 9, 2024Updated last year
- Responsible for building and setting up the Triton (formerly SmartDataCenter) headnode.☆18Mar 18, 2026Updated last week
- SMPP client library☆15Mar 17, 2026Updated last week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A Gatsby starter for creating blogs from headless WordPress CMS.☆17Dec 15, 2023Updated 2 years ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- ☆16Jul 18, 2024Updated last year
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 11 months ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Installing talos on a Turing Piv2 board with cm4 modules.☆15Aug 27, 2023Updated 2 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- https://github.com/ManhNho/AWAE-OSWE☆11Aug 1, 2020Updated 5 years ago
- Create a Shell Link a.k.a. Shortcut on Windows from command line☆15Jan 6, 2026Updated 2 months ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- Issues to consider when planning a red team exercise.☆14Aug 23, 2017Updated 8 years ago
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated last month
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Portable WiFi/Bluetooth/RF-433MHz hacking device☆42Jun 29, 2024Updated last year
- ☆20Jul 25, 2023Updated 2 years ago
- HTTP service that receives log entries as JSON and sends them to users via a Telegram bot.☆19Jul 6, 2024Updated last year
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 3 months ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- Slides of my public talks☆63Feb 20, 2026Updated last month