kdpy / suhas_kdView external linksLinks
drone_security
☆14Jun 18, 2021Updated 4 years ago
Alternatives and similar repositories for suhas_kd
Users that are interested in suhas_kd are comparing it to the libraries listed below
Sorting:
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆12May 9, 2020Updated 5 years ago
- instagram bot reports spam☆10Oct 19, 2020Updated 5 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- detect UAV based on YOLOv5 and siamRPN☆10Oct 20, 2021Updated 4 years ago
- ☄️ Fast, 100% Accurate, Anti Honeypot SSH Cracker 🔑☆15May 1, 2022Updated 3 years ago
- Dr. Orbiteex - TLE/OEM 3D/2D viewer and analyser☆13Jul 14, 2024Updated last year
- A Deep Learning-based Real-time Object Detector for DJI Drones☆12Oct 5, 2018Updated 7 years ago
- ☆14Jan 31, 2026Updated 2 weeks ago
- ☆16Oct 27, 2025Updated 3 months ago
- FengYun-2 S-VISSR2.0 Decoder☆11Aug 25, 2024Updated last year
- Run command as root without password☆12Jul 20, 2022Updated 3 years ago
- A Qt frontend for creating gps simulations and transmitting them with an SDR.☆11Aug 22, 2021Updated 4 years ago
- Brute force your iOS Restrictions Passcode from the key & salt☆14Aug 27, 2019Updated 6 years ago
- MITM to Capture FTP Credentials☆14Apr 27, 2022Updated 3 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆11Nov 6, 2022Updated 3 years ago
- ☆12Jul 29, 2016Updated 9 years ago
- ☆11Feb 16, 2024Updated last year
- A super dope tool, that generates "corrupted" .PDF files of randomly unique file sizes (no two files of the same size or byte combination…☆14Oct 12, 2021Updated 4 years ago
- Utilize IBM Cloud Functions with OAuth 2.0 to enable authentication and authorization☆11Feb 14, 2022Updated 3 years ago
- This bot attends the online classes held on Microsoft teams, according to the given timetable.Informs if bot is successfully joined the m…☆11Feb 2, 2022Updated 4 years ago
- Play 2048 in notepad.exe☆13Feb 16, 2015Updated 10 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 2 years ago
- iDevice Exploit Injector☆13Apr 26, 2011Updated 14 years ago
- Very basic Web created with HTML and JavaScript to create Online Payload to do Reverse Shells☆12Oct 12, 2022Updated 3 years ago
- ☆14Updated this week
- Online test is available 👉☆12Feb 2, 2026Updated last week
- ☆11May 13, 2024Updated last year
- KUBChain Explorer☆11Oct 22, 2025Updated 3 months ago
- ☆11Aug 11, 2012Updated 13 years ago
- Frequency hopping spread spectrum analyzer and repeat attack program for use with a Nuand BladeRF☆10Apr 10, 2015Updated 10 years ago
- ☆12Dec 6, 2024Updated last year
- Information gathering tool by Arjun arz☆11Jul 3, 2020Updated 5 years ago
- This is a project with .net server crypter for bypass AV's Runtime detection.☆11Sep 8, 2017Updated 8 years ago
- An adapter for DoIt ESP32 DevKit to fit into NodeMCU's V1.0 DIP socket☆14Mar 12, 2019Updated 6 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- AeroSandbox models for commercial transport aircraft☆14Sep 20, 2023Updated 2 years ago
- Try to use deep learning to realize AMR☆11Nov 4, 2017Updated 8 years ago
- Chromium Browser Credential Extractor☆10Updated this week