n1ght-w0lf / n1ght-w0lf.github.ioView external linksLinks
☆13Feb 4, 2024Updated 2 years ago
Alternatives and similar repositories for n1ght-w0lf.github.io
Users that are interested in n1ght-w0lf.github.io are comparing it to the libraries listed below
Sorting:
- ☆10Oct 13, 2020Updated 5 years ago
- This repo about how to start in Pen-Testing Fields☆31Aug 8, 2022Updated 3 years ago
- Bu bir not defteri programıdır. Sayfalar halinde not tutmanızı sağlar ve sadece Linux işletim sistemi için hazırlanmıştır. Yazdığınız not…☆13Apr 13, 2025Updated 10 months ago
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- ☆83Mar 7, 2025Updated 11 months ago
- Android client for e-learning platform SWAD (http://openswad.org/).☆20Sep 1, 2022Updated 3 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- ccm - A small python library that helps identify vulnerabilities inside of encrypted data☆11Aug 17, 2020Updated 5 years ago
- A simple application to keep on an eye on the availability of HTTP sites☆15Oct 10, 2023Updated 2 years ago
- An patch porting qwingraph (wingraph written in qt4) to qt5.☆10Aug 21, 2019Updated 6 years ago
- Training for Golang (go language)☆10Mar 29, 2019Updated 6 years ago
- CLI generator for Velociraptor offline collector☆15Oct 10, 2025Updated 4 months ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- DHCP starvation utility☆10Mar 25, 2017Updated 8 years ago
- A (purpousely) vulnerable, social-media-like, django web application☆12Jun 10, 2021Updated 4 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- Entire Unity project, code and assets, for a WebGL game. Flappy bird clone.☆11Oct 29, 2019Updated 6 years ago
- really ?☆12Feb 29, 2024Updated last year
- ☆11Sep 7, 2017Updated 8 years ago
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆14Jun 4, 2025Updated 8 months ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated last month
- A collection of YARA signatures that I have found around the web.☆11Apr 29, 2016Updated 9 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Oct 26, 2020Updated 5 years ago
- Read Registry.pol files on Linux, or anywhere Python runs!☆17Jun 12, 2023Updated 2 years ago
- ☆11Apr 7, 2022Updated 3 years ago
- Script examples - Bash, PowerShell, etc.☆16Jan 1, 2025Updated last year
- Incident Response automation scripts☆16Sep 5, 2025Updated 5 months ago
- ☆13Feb 29, 2020Updated 5 years ago
- Example blueprint file for Image Builder☆11Mar 5, 2021Updated 4 years ago
- Challenge for the 33C3 CTF☆15Jan 3, 2017Updated 9 years ago
- Ultimate DevSecOps library☆14Nov 13, 2022Updated 3 years ago
- Tool for diagnostic of Android device☆11Sep 21, 2024Updated last year
- Framework to reverse engineer binaries and evaluate similarities across a large collections of files. Uses sector hashing and data flow …☆15May 23, 2023Updated 2 years ago
- ☆18Nov 7, 2024Updated last year
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 10 months ago
- ☆22Apr 4, 2024Updated last year
- ☆18Mar 26, 2025Updated 10 months ago
- Java and Android mobile alerting and secure wipe application(s)☆24Oct 8, 2011Updated 14 years ago
- ☆23May 9, 2013Updated 12 years ago