m4n3dw0lf / vampyView external linksLinks
VAMPY - Minimal tool for RAM dumping.
☆10Jul 1, 2017Updated 8 years ago
Alternatives and similar repositories for vampy
Users that are interested in vampy are comparing it to the libraries listed below
Sorting:
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- My Collection of x64 Assembly programs with NASM☆21Oct 21, 2018Updated 7 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆62Oct 23, 2019Updated 6 years ago
- Node.js DTLS Proxy, library and tools to connect plain-text UDP clients with plain-text UDP servers over an encrypted UDP tunnel..☆14Dec 2, 2018Updated 7 years ago
- Voice command assistant☆37Nov 16, 2016Updated 9 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- This repo contains the exercises, I did while reading through the Learn Python the hard way book by Zed A. Shaw☆16Sep 23, 2017Updated 8 years ago
- Unofficial Linux client for the Blokada-VPN-service☆10Aug 26, 2022Updated 3 years ago
- A simple 'This day in history' API written in Python, that pulls data from wikipedia☆17May 22, 2025Updated 8 months ago
- Introduction to Python Course Lectures and Supportive Articles☆10Mar 18, 2023Updated 2 years ago
- Optimize PNG image files by removing unnecessary PNG chunks thus losslessly reducing file size.☆11Mar 31, 2016Updated 9 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Opencart Bruteforce and Upload Image☆11Aug 13, 2019Updated 6 years ago
- ☆11Aug 11, 2016Updated 9 years ago
- Decentralized chat with private messages and rooms. Messages and files are encrypted using RSA☆36Dec 4, 2017Updated 8 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- This is a WIP. Here be dragons.☆12Jun 28, 2019Updated 6 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- 复现Django漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- ☆12Mar 24, 2018Updated 7 years ago
- Copinya custom Unix Shell☆10Mar 16, 2019Updated 6 years ago
- ☆11Mar 8, 2025Updated 11 months ago
- Self-made scripts, which I often need every time I make a new linux installation or working with another pc☆13Nov 5, 2025Updated 3 months ago
- A simple retro-pixelart 2D game engine (Hacker's Week 5 workshop)☆13Mar 21, 2018Updated 7 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Example of Java to C++ communication in Qt.☆10Oct 7, 2014Updated 11 years ago
- ☆16Dec 8, 2022Updated 3 years ago
- Faceted search example using Swiftype and jQuery☆14Jun 23, 2023Updated 2 years ago
- Exploit laravel database config☆10Feb 10, 2019Updated 7 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- TOXID cURL Module connects OXID eShop with TYPO3 and other CMS☆27Jan 27, 2026Updated 2 weeks ago
- Index of Icestudio resources: blocks, collections, icons, examples...☆13Dec 18, 2021Updated 4 years ago