A simple arduino operating system, aiming at simple development on embedded platforms
☆14Jun 12, 2018Updated 7 years ago
Alternatives and similar repositories for MicroOS
Users that are interested in MicroOS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 10x10cm PCB variant of ZX-UNO project for G738/G706 enclosure☆22May 2, 2025Updated last year
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- RTuinOS, a small Real Time Operating System (RTOS) for Arduino☆69Jan 24, 2021Updated 5 years ago
- MIDI player for ZX Spectrum☆22May 24, 2025Updated 11 months ago
- Auto exploiter + Dumper, steal information on victim site, and auto create mailer on victim☆12Jan 6, 2019Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 🍭 Web Application Vulnerability Scanner 🍭☆16May 21, 2022Updated 3 years ago
- Bitcoin Wallet Cracker☆13May 19, 2022Updated 3 years ago
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15May 30, 2023Updated 2 years ago
- A wireless serial interface for ESP32 with a web-based UI for easy communication and configuration, ideal for connecting to Arduino proje…☆24May 26, 2024Updated last year
- Hacking bitcoin private keys☆16Aug 25, 2020Updated 5 years ago
- An open-source modern exploitation framework inspired by Metasploit☆19Jul 13, 2024Updated last year
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Apr 17, 2022Updated 4 years ago
- Th3_Monster Tool 2.5 ☣ Website Vulnerability Scanner & Auto Exploiter Bot ☣ .☆18Aug 11, 2018Updated 7 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Nov 21, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- A simple tool which makes creating nuclei templates even easier.☆37Jun 23, 2024Updated last year
- This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to 36 common web applicatio…☆26Dec 7, 2025Updated 4 months ago
- (DOM-)XSS fuzzer based on phantomjs and go.☆33Dec 18, 2014Updated 11 years ago
- Auto Updater Joomla Components and Exploits Scanner☆27Apr 1, 2018Updated 8 years ago
- My own Custom nuclei templates☆26Dec 8, 2021Updated 4 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆34Aug 28, 2023Updated 2 years ago
- WordPress auto exploit☆29Dec 28, 2017Updated 8 years ago
- A flask web app made for scanning vulnerabilites on a website, network exploitation, reconnaissance☆27Jan 16, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Floppy disk emulator for old computers and machines, Amiga, Atari ST, etc.☆63Dec 5, 2020Updated 5 years ago
- This tool is uses for SQLI+LFI+XSS+LFI+RCE Dorking and finding vulnerable sites.☆31Feb 19, 2019Updated 7 years ago
- Godzilla is an automated scanner tool for bug hunters/pentesters that can scan website for vulnerabilities, Do Information gathering in N…☆30Sep 6, 2019Updated 6 years ago
- Drupal Exploiter Tool (Drupal Hunter)☆37Apr 29, 2018Updated 8 years ago
- BTCFucker is a bitcoin-address generator which tries to generate a wallet which contains bitcoins☆37Dec 11, 2021Updated 4 years ago
- Some contributions in the nuclei-templates repository☆63Jun 18, 2022Updated 3 years ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆88Dec 29, 2023Updated 2 years ago
- Brute-force the private key of a Bitcoin address☆55Apr 17, 2023Updated 3 years ago
- Hunt Crack and Hacked Private Key Bitcoin Wallet With SmitBlock in Python and Node☆77Mar 4, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- RED CRYPTO MAGIC - Hunt and Crack Private Key (Bytes, Hex) With Mnemonic Ethereum And Polkadot☆61Nov 6, 2022Updated 3 years ago
- Take raw IR signal from a remote receiver and print out pulse lengths☆167Aug 10, 2024Updated last year
- All Convertor Private key (HEX) To Address Wallet Bitcoin☆84Apr 11, 2024Updated 2 years ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆91Jul 26, 2024Updated last year
- Nuclei Templates - Here you will find the templates I use while hunting☆120Sep 27, 2021Updated 4 years ago
- Multithreaded Plugin based vulnerability scanner for mass detection of web-based applications vulnerabilities☆127Jun 4, 2023Updated 2 years ago
- Nuclei Templates to reproduce Cracking the lens's Research☆130Jan 8, 2022Updated 4 years ago