A cross-platform mobile app used for events, conferences, symposiums, and more. Built on the Liferay and Titanium Appcelerator platforms.
☆15Jan 19, 2016Updated 10 years ago
Alternatives and similar repositories for liferay-events-app
Users that are interested in liferay-events-app are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Google dork generator with php☆20Nov 18, 2022Updated 3 years ago
- Trojan Rat Builder(348), Ransomware Builder(17), Crypter(110), Miner(9), Worm(8), Botnet(49), Virus Builder(62), Binder(35), Exploit(42),…☆20Mar 29, 2022Updated 4 years ago
- PoC Hacking Tool Contains so many stuff like hash cracking, Crypter, Ransomware Builder, etc...☆16Aug 27, 2021Updated 4 years ago
- Database smell detector☆13Jan 24, 2018Updated 8 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Reverse whois query tool☆11Jul 28, 2016Updated 9 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- A scanner for the FortiNet vulnerability CVE-2025-64446☆31Nov 18, 2025Updated 5 months ago
- Scans a given directory tree for interesting assembly references☆17Apr 30, 2026Updated last week
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 5 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- Chrome Extensions Dataset☆11Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- PowerShell alternative/restriction bypass☆11Apr 6, 2025Updated last year
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆17Jul 20, 2017Updated 8 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated last month
- ☆13Oct 14, 2017Updated 8 years ago
- Enhanced-PsExec the GUI edition☆13Sep 8, 2021Updated 4 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- C# client for SonarQube 8.x☆11Apr 6, 2023Updated 3 years ago
- A .NET library that can read and write .reg files☆12Mar 18, 2022Updated 4 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated 2 months ago
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 5 years ago
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 9 months ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Sep 18, 2020Updated 5 years ago
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- Very Easy Relative Backdoor Application☆14Jun 8, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This is the facade for installation and access to the individual components☆16Apr 8, 2026Updated last month
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 8 months ago
- ☆14May 17, 2018Updated 7 years ago
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- ☆13Feb 22, 2023Updated 3 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- This tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse pr…☆14Feb 20, 2023Updated 3 years ago