A command line Swiss army knife for string and number conversions
☆18Feb 27, 2026Updated last month
Alternatives and similar repositories for examine
Users that are interested in examine are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Injector a.k.a tr4c1l0rds is a tool to run simultaneous sql injections attacks anonymously using containers.☆19Jul 21, 2023Updated 2 years ago
- Dotfiles for my personal computer!☆16May 17, 2021Updated 4 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Sep 28, 2017Updated 8 years ago
- WPSploit - Exploiting Wordpress With Metasploit☆232Apr 30, 2018Updated 7 years ago
- git clone all repositories and gists from a given GitHub username☆32Feb 27, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- H2HC 2016 Slides/Materials/Presentations☆28Dec 21, 2016Updated 9 years ago
- Public Exploits☆10Apr 6, 2021Updated 5 years ago
- 通过Shizuku授权,实现修改部分系统设置项。☆17Apr 1, 2024Updated 2 years ago
- ☆15May 17, 2018Updated 7 years ago
- ☆13May 9, 2017Updated 8 years ago
- A dumb afl-fuzz triage tool.☆14Dec 8, 2022Updated 3 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 3 months ago
- Uma pequena coleção de malwares produzidos para atacar em território nacional☆15Feb 26, 2018Updated 8 years ago
- The PE file analysis toolkit☆772Mar 21, 2026Updated 3 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This program focuses on automating the download, installation and compilation of pentest tools from source☆33Oct 30, 2018Updated 7 years ago
- Man in the middle automated attacks☆21Dec 17, 2015Updated 10 years ago
- Recon(Amass, Naabu, Nuclei) workflow with Github Actions☆17Nov 12, 2024Updated last year
- SonicWall VPN-SSL Exploit* using Golang ( * and other targets vulnerable to shellshock ).☆18Feb 11, 2021Updated 5 years ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆16Jan 31, 2024Updated 2 years ago
- ☆12Apr 3, 2016Updated 10 years ago
- ☆14Sep 27, 2023Updated 2 years ago
- Setup HiddenEye Inside Of Termux☆10Jun 9, 2019Updated 6 years ago
- Realme基于shizuku双开工具☆16Nov 4, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Notifications when metasploit msf session up or down in telegram.☆11Feb 20, 2018Updated 8 years ago
- 在单设备上共享设备管理员权限☆10Nov 23, 2019Updated 6 years ago
- A repo containing all the cool stuff that makes my ~ feel like $HOME. 🏠☆14Jul 17, 2024Updated last year
- 只是用来配合某篇文章展示的☆11Aug 15, 2016Updated 9 years ago
- Portable utility to execute in memory a sequence of opcodes☆18Aug 28, 2016Updated 9 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆43Dec 17, 2024Updated last year
- voenabler☆11Sep 29, 2017Updated 8 years ago
- ☆15Apr 3, 2026Updated last week
- PoC || GTFO Issues☆71Feb 12, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Pwn2Win CTF 2017☆27Nov 1, 2017Updated 8 years ago
- ☆44Feb 27, 2017Updated 9 years ago
- Drupal 7.x Services Module Remote Code Execution Exploit - https://www.ambionics.io/blog/drupal-services-module-rce☆14Mar 9, 2017Updated 9 years ago
- Labs from our workshop "Demystifying the server-side".☆17May 30, 2022Updated 3 years ago
- misc stuff☆19Jun 1, 2017Updated 8 years ago
- vagrant lab☆10Feb 15, 2018Updated 8 years ago
- SPLITTER is TOR based load balance approach create to difficult correlation, traffic analysis and statistical attacks inside TOR network.☆138Aug 9, 2023Updated 2 years ago