Jakub's security research
☆13Apr 17, 2026Updated 2 weeks ago
Alternatives and similar repositories for security-research
Users that are interested in security-research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Apr 16, 2026Updated 2 weeks ago
- Universal backend for indexing, storing, and querying documents.☆24Nov 10, 2019Updated 6 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- Scripts, tools and drivers for wardriving under Mac OSX☆14Dec 7, 2016Updated 9 years ago
- CVE-2013-6282 exploit☆27Nov 18, 2013Updated 12 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆12Oct 17, 2020Updated 5 years ago
- How to unlock iCloud locked Apple iPad 2, iPad 3, iPad 4, iPad Air, iPad mini, iPad mini with Retina with 3G☆23Oct 20, 2014Updated 11 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- CryptoChecker with bunch of features. Seedphrase checker, Metamask, Brave, Ronin, Binance Chain, Exodus, Atomic wallets. NFT & Airdrops c…☆37May 15, 2025Updated 11 months ago
- 个人笔记☆16Apr 1, 2026Updated last month
- Scripts for starting, stopping, checking setup and others ported from Kali Linux for general systemd systems☆17Jun 8, 2017Updated 8 years ago
- demo material for my PowerShell Scripting Secrets presentation☆15Nov 20, 2017Updated 8 years ago
- Advanced Android and System Hacking Tool . This tool used for some Cyber Attacks in System This Tool used for educational purpose and Thi…☆35Apr 14, 2025Updated last year
- Ansible module which allows to easily add, remove or set mount options in /etc/fstab.☆12Apr 21, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Apple Encrypted Archive☆26Sep 26, 2025Updated 7 months ago
- HTTP host monitoring and management through DNS☆10Aug 31, 2021Updated 4 years ago
- Servermon is a Django project with the aim of facilitating server monitoring and management through Puppet☆24Dec 11, 2018Updated 7 years ago
- The PS4 Tools Homebrew Source Code☆11Jan 3, 2022Updated 4 years ago
- Basic password cracker. These tools can be used to crack various types of password hashes, the program applies the technique to recover t…☆10Mar 22, 2023Updated 3 years ago
- Prometheus Exporter for Mastodon☆16Apr 24, 2026Updated last week
- Some Python to process the Wikileaks Cablegate data.☆19Nov 30, 2010Updated 15 years ago
- Porting Kali NetHunter on Samsung Galaxy S4 (jfltexx) LineageOS 16☆10Oct 27, 2019Updated 6 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Installer for Kiosk Mode applications that sets lock mode.☆12Jan 28, 2021Updated 5 years ago
- Notes relating to secure messaging☆20Jun 11, 2016Updated 9 years ago
- back-to-work is a failover cluster manager written in POSIX shell scripting language☆10Aug 16, 2016Updated 9 years ago
- HACK ATM MACHINES NEAREST TO YOU AND BECOME RICH!!! You can hack and break into a bank’s security ATM Machine without carrying guns or an…☆19Sep 14, 2016Updated 9 years ago
- Webhook puppet module for executing r10k when git repository is pushed.☆12Apr 13, 2015Updated 11 years ago
- Release browser resources by suspending the tabs you aren't using☆11Jan 19, 2022Updated 4 years ago
- ☆19Apr 16, 2021Updated 5 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- how to hack pattern lock☆15Dec 27, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Malware (analysis results, tools, reference, analysis methods, etc.)☆16Apr 18, 2023Updated 3 years ago
- to grab or steal the password of systemAutomated sticky keys hack. Post exploitation it grabs browser passwords, history, and network pas…☆59Jan 31, 2018Updated 8 years ago
- IMAP email synchronisation tool, fork and drop-in replacement for offlineimap3☆15Jul 1, 2025Updated 10 months ago
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆10Sep 12, 2024Updated last year
- Gitlab LGTM merge Bot.☆14Aug 31, 2016Updated 9 years ago
- DEF CON Hacker Tracker☆14Jul 30, 2025Updated 9 months ago
- The Source Code for the 31 Days of Windows 8☆61Dec 14, 2012Updated 13 years ago