Install RHEL7 via kickstart, properly secured and locked down.
☆16Sep 27, 2016Updated 9 years ago
Alternatives and similar repositories for xkeyscore
Users that are interested in xkeyscore are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Communicate with government surveillance programs via your metadata.☆27Oct 9, 2018Updated 7 years ago
- Gambling webpage with a three-layer architecture and client-server based. Languages used: JAVA for the backend and HTML, CSS, JS and JQue…☆11Nov 8, 2019Updated 6 years ago
- This repository provides a comprehensive guide for controlling motors and sensors using Arduino, Raspberry Pi, and ESP boards. Step-by-st…☆15Feb 9, 2024Updated 2 years ago
- As a new YouTuber, you might be looking for a way to increase your YouTube subscribers, views, and likes. There are many websites that ar…☆20Sep 24, 2025Updated 7 months ago
- Brute Force attack with Python in Kali Linux☆14Mar 6, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Fixes to pyobd for modern hardware interfaces☆11Oct 3, 2015Updated 10 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 10 years ago
- A python script that automates the process of giving input to GPT and receiving output☆10Apr 2, 2023Updated 3 years ago
- ☆10Jan 5, 2015Updated 11 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Basic password cracker. These tools can be used to crack various types of password hashes, the program applies the technique to recover t…☆10Mar 22, 2023Updated 3 years ago
- FCracker is a command line tool designed to brute force encrypted files like zip, 7z, rar, pdf etc.☆37Mar 25, 2021Updated 5 years ago
- Some Python to process the Wikileaks Cablegate data.☆19Nov 30, 2010Updated 15 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Open Redirect Vulnerability Payload List☆11Feb 23, 2021Updated 5 years ago
- The GUI is built on top of the osmo-nitb-scripts-calypsobts OR osmo-nitb-scripts software packages, which are used to configure and opera…☆22May 1, 2024Updated 2 years ago
- Auto-Video maker handling many AI's☆11Mar 18, 2024Updated 2 years ago
- upload a manim script and generate an animation☆11Mar 10, 2024Updated 2 years ago
- Distributed game of life (inspired by Torben Hoffman's solution found at https://github.com/lehoff/egol)☆11Aug 13, 2015Updated 10 years ago
- HACK ATM MACHINES NEAREST TO YOU AND BECOME RICH!!! You can hack and break into a bank’s security ATM Machine without carrying guns or an…☆19Sep 14, 2016Updated 9 years ago
- This is the app is made to hack ATM card trust wallet address withdraw and online assess☆14Oct 27, 2022Updated 3 years ago
- Resident (inotify) Anti-Malware Scanner using rules from Linux Malware Detect project☆11Jul 5, 2014Updated 11 years ago
- NeMo: a toolkit for conversational AI☆12Dec 23, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- python code generation from natural language prompt☆15Jun 30, 2022Updated 3 years ago
- how to hack pattern lock☆15Dec 27, 2020Updated 5 years ago
- Buffruneio provides rune-based buffered input☆30Nov 12, 2020Updated 5 years ago
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆10Sep 12, 2024Updated last year
- A web app that unlocks/bypasses password-protected excel file☆13Mar 16, 2024Updated 2 years ago
- DEF CON Hacker Tracker☆15Jul 30, 2025Updated 9 months ago
- ☆15Mar 29, 2024Updated 2 years ago
- The Source Code for the 31 Days of Windows 8☆61Dec 14, 2012Updated 13 years ago
- This is the criminal face recognition application can be used as surviellance system.☆21May 25, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Serverless prisma2 example with auth and subscriptions*☆15Jan 24, 2023Updated 3 years ago
- ☆21Aug 7, 2014Updated 11 years ago
- AxSpy is an application who allow you to monitoring an Android phone for free. Ideal for parents who want to keep an eye on their childre…☆11Dec 10, 2013Updated 12 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Dec 27, 2018Updated 7 years ago
- Perform With Mass Exploiter In Joomla 4.2.8.☆35Jul 24, 2023Updated 2 years ago
- promptflowx is a simple and powerful tool for building prompt-driven workflows.☆14Jul 31, 2024Updated last year
- Distributed replicated full text search using Bleve and FoundationDB☆10Dec 25, 2024Updated last year