☆27May 17, 2023Updated 2 years ago
Alternatives and similar repositories for Real-Time-Chat-Application
Users that are interested in Real-Time-Chat-Application are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆30Dec 17, 2018Updated 7 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 6 months ago
- Microfocus ArcSight FlexConnector for Microsoft Sysmon tool☆19Jan 14, 2021Updated 5 years ago
- Linux #rootkit and #malware revealer☆31Aug 1, 2024Updated last year
- Command-line tool to detect email spoofing vulnerabilities by analyzing SPF and DMARC DNS records. Supports single and bulk domain checks…☆25Apr 8, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆25Feb 18, 2025Updated last year
- Webripper Pro is a comprehensive, professional-grade web vulnerability scanner that automates the detection of security flaws in websites…☆39Jul 4, 2025Updated 9 months ago
- Make a 100% FUD Android Trojan and Bypass All Anti-Viruses + Android Google Play Protector☆100Oct 12, 2025Updated 6 months ago
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆46Mar 2, 2020Updated 6 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52May 26, 2024Updated last year
- DigitalShadows Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆47Jul 8, 2019Updated 6 years ago
- An automated NMAP python script☆46Feb 15, 2025Updated last year
- ☆111Sep 29, 2018Updated 7 years ago
- A small template for Android Hooking with Substrate (Or Dobby. See branches). (Includes a mod menu written in Java)☆244Aug 16, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- SPY BOMB is a tool used to generate various payloads for android,windows,ios,mac and many more it is very user friendly tool.☆256Dec 31, 2023Updated 2 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆108Jan 19, 2023Updated 3 years ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆104Apr 11, 2025Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆112Jan 12, 2024Updated 2 years ago
- QuadraInspect is an Android framework that integrates AndroPass, APKUtil, and MobFS, providing a powerful tool for analyzing the security…☆347Jun 25, 2024Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆123Jan 15, 2025Updated last year
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆131Mar 25, 2025Updated last year
- A tiny tool built to help AD Admins tame the Protected Users group.☆140Mar 22, 2026Updated 3 weeks ago
- A tool that allows you to search for vulnerable android devices across the world and exploit them.☆425Sep 3, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Consolidation of various resources related to Microsoft Sysmon & sample data/log☆122Sep 20, 2021Updated 4 years ago
- The default package source of the Zeek Package Manager. Wrote a package? See the README for how to get it included.☆143Mar 25, 2026Updated 2 weeks ago
- Sigma rule specification☆180Feb 5, 2026Updated 2 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆372Aug 29, 2025Updated 7 months ago
- An AFF4 C++ implementation.☆214Mar 24, 2023Updated 3 years ago
- Python rewrite of passive OS fingerprinting tool☆210Dec 24, 2025Updated 3 months ago
- Artifact collection tool for *nix systems☆216Mar 20, 2024Updated 2 years ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆530Feb 5, 2024Updated 2 years ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆238Jan 25, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year
- Hack Victim android Camera Using Link with Termux/Kali-linux☆860Aug 30, 2023Updated 2 years ago
- OpenFuck exploit updated to linux 2018 - Apache mod_ssl < 2.8.7 OpenSSL - Remote Buffer Overflow☆196Oct 20, 2025Updated 5 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆273Dec 23, 2024Updated last year
- Android Penetration Tool [ RAT for Android ]☆805May 21, 2023Updated 2 years ago
- A python based tool for exploiting and managing Android devices via ADB☆886Mar 12, 2023Updated 3 years ago
- Espressif-IDE (ESP-IDF Eclipse Plugin) for ESP-IDF CMake based projects 5.x and above☆360Updated this week