A computer programming AI bot in python django
☆56Mar 28, 2024Updated 2 years ago
Alternatives and similar repositories for WOLFGPT
Users that are interested in WOLFGPT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Jun 11, 2023Updated 2 years ago
- Fast subdomains enumeration tool for penetration testers☆14Feb 3, 2020Updated 6 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆17Jul 25, 2014Updated 11 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆42Jan 31, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆14Mar 28, 2018Updated 8 years ago
- ~/.dotfiles☆13Apr 22, 2023Updated 2 years ago
- A C++ library to build Polymorphic Viruses.☆10Oct 30, 2023Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated 2 years ago
- ☆18Mar 22, 2021Updated 5 years ago
- PoC☆12Apr 7, 2025Updated last year
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆14Sep 27, 2016Updated 9 years ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- gh0str3con is a All in one cloud based web Recon tool.☆24Jul 8, 2024Updated last year
- The Best DDoS Attack Tool + Bypass Cloud Flare CDN For Priv8☆19Oct 14, 2025Updated 6 months ago
- a list of web browser vulnerabilities☆20May 10, 2020Updated 5 years ago
- website admin panel finder☆34Dec 29, 2020Updated 5 years ago
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 3 months ago
- simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose☆17Feb 24, 2023Updated 3 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Burp Suite plugin that adds additional checks to the passive scanner to reveal the origin IP(s) of Cloudflare-protected web applications.☆63Nov 29, 2022Updated 3 years ago
- Malware Libraries focused in help Malware Development☆25Mar 20, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CiLocks | Android/IOS Hacking 📱 Crack Interface lockscreen, Metasploit and More Android/IOS Hacking☆29Jan 31, 2023Updated 3 years ago
- Virus Repository☆29Jan 2, 2022Updated 4 years ago
- Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12☆13Aug 12, 2024Updated last year
- CEH v13 exam resources & Tips☆38Jun 24, 2025Updated 9 months ago
- How to install Kali in VirtualBox☆14May 3, 2024Updated last year
- ☆30Sep 19, 2025Updated 6 months ago
- programmatic control of the mouse☆16Jun 28, 2023Updated 2 years ago
- Android Hacking Over Wan☆23Dec 23, 2019Updated 6 years ago
- simple bash script to earn bounties☆36Apr 27, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆16Mar 3, 2026Updated last month
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- SPIP BigUp Plugin Unauthenticated RCE☆16Sep 7, 2024Updated last year
- Check if domain has bug bounty program or not☆28Jul 28, 2023Updated 2 years ago
- SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)☆97Jan 11, 2022Updated 4 years ago
- CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection☆17Sep 16, 2024Updated last year