☆229Feb 20, 2026Updated last month
Alternatives and similar repositories for marketing-skills
Users that are interested in marketing-skills are comparing it to the libraries listed below
Sorting:
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- i2p c++ implementation☆19Feb 21, 2015Updated 11 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- WordPress Optimization Solutions☆10Mar 13, 2019Updated 7 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- JavaScript implementation of Cryptographic Hyperlinks specification.☆14Jan 14, 2023Updated 3 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- ☆12May 1, 2023Updated 2 years ago
- Ansible role for installing/configuring centminmod on CentOS 7☆13May 24, 2017Updated 8 years ago
- ☆10May 30, 2015Updated 10 years ago
- Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This applicatio…☆14Mar 26, 2014Updated 11 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Jun 29, 2015Updated 10 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- A Wordpress Exploitation Toolkit☆15Nov 22, 2017Updated 8 years ago
- PowerShell functions, scripts and modules☆15Dec 11, 2016Updated 9 years ago
- A small command line application that pulls temps of various hardware components using Open Hardware Monitor Lib, outputs info along with…☆12Feb 14, 2018Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- A scalable framework to perform retrieval testing over Filecoin network☆13Apr 16, 2024Updated last year
- Network Scout (NS) is an extension to Artillery. NS allows you to access log files from multiple clients.☆21May 2, 2016Updated 9 years ago
- A map of who's doing what about Blockchain in Thailand☆13Oct 2, 2018Updated 7 years ago
- ☆17Dec 9, 2014Updated 11 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- ☆14Feb 9, 2026Updated last month
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- ☆14Jan 26, 2015Updated 11 years ago
- Web Interface Portal & Security Threat Engine for REMnux☆24Aug 1, 2016Updated 9 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- Uses AES to run encrypted shellcode using Python and ctypes☆15Jan 17, 2016Updated 10 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Feb 17, 2015Updated 11 years ago
- ☆15Feb 18, 2016Updated 10 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20May 18, 2016Updated 9 years ago
- Forensic Dropbox☆22Jul 2, 2012Updated 13 years ago
- The third open source piece of ransomware using bash☆15Aug 18, 2015Updated 10 years ago
- Auto backup easy engine sites to Google Drive, Minio Bucket☆17Jul 23, 2016Updated 9 years ago
- Firefox Addon to fool websites with spoofed X-Forwarded-For headers☆18Oct 13, 2013Updated 12 years ago