☆12Jun 24, 2022Updated 3 years ago
Alternatives and similar repositories for Cryptoma
Users that are interested in Cryptoma are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆34Jun 13, 2023Updated 2 years ago
- PDF Converter with multiple features based on your needs.☆10Jun 28, 2022Updated 3 years ago
- A network logging tool that logs per process activities☆32Jun 13, 2023Updated 2 years ago
- This is a Video Making of Android apps made entirely with Java. If you want, you can download and modify it and use it yourself. Thanks☆23Jun 3, 2022Updated 3 years ago
- Generates an image from a given tweet! (Puppeteer + Netlify serverless functions + Svelte)☆11Jan 7, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- OpenBugBounty - https://www.openbugbounty.org/ programs list☆23Mar 15, 2021Updated 5 years ago
- Powered by Library Genesis☆23Jun 4, 2016Updated 9 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- USB rubber ducky 2.O, A simple programmes which stole victim sensitive data by USB in one click & bypass firewall & defender.☆11Apr 21, 2021Updated 4 years ago
- https://pinkdraconian.gitbook.io/methodology/☆13Aug 24, 2021Updated 4 years ago
- SAP penetration testing Web and network cheatsheet☆17May 15, 2022Updated 3 years ago
- ☆10Mar 27, 2022Updated 3 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- To-do manager, notepad, RSS reader...☆15Dec 1, 2014Updated 11 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- My easy 2-click solution to Windows' bloatware, resource hogging, and telemetry. Works best with Windows 11 Enterprise, pretty good with …☆41Dec 29, 2025Updated 2 months ago
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- Catzilla is a next-generation, high-performance web framework for Python—built on a lean C core and designed to handle AI-heavy, high-thr…☆37Dec 2, 2025Updated 3 months ago
- Just a Data Structure & Algorithms repository to keep track of my progress.☆14May 20, 2022Updated 3 years ago
- API Hammering with C++20☆51Jul 21, 2022Updated 3 years ago
- Some of my assembly code (examples, iterative and recursive algorithms) from Computer's Architecture course in Sapienza University, CS Ba…☆19Nov 10, 2024Updated last year
- Static Decryptor for IcedID Malware☆18Oct 1, 2022Updated 3 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- Collect information of Windows PC when doing incident response☆252Jun 5, 2023Updated 2 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated 2 years ago
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆32Nov 3, 2023Updated 2 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- Neo-reGeorg is a project that seeks to aggressively refactor reGeorg☆10Dec 26, 2022Updated 3 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Jan 6, 2021Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Some contributions in the nuclei-templates repository☆62Jun 18, 2022Updated 3 years ago
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- A Project where I try to learn something new every day, and this is a place to track it☆18Oct 11, 2021Updated 4 years ago
- Find DLLs with RWX section☆79Jul 3, 2023Updated 2 years ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- A utility/trolling script for Stand and the Stand API.☆23Jul 26, 2023Updated 2 years ago