Fairly Undetectable Linux Spyware
☆18Mar 1, 2023Updated 3 years ago
Alternatives and similar repositories for Raven
Users that are interested in Raven are comparing it to the libraries listed below
Sorting:
- AirBnB_clone team project☆11Nov 27, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- A FullC2 Framework TUI + Web UI That Focuses On Network Stressing☆14Aug 24, 2025Updated 6 months ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- ☆16Nov 11, 2022Updated 3 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- Google hacking☆11Apr 26, 2023Updated 2 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Feb 1, 2023Updated 3 years ago
- Ray-casting game for wasting productive time.☆11May 23, 2021Updated 4 years ago
- ☆10Feb 6, 2020Updated 6 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 2 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- Simulate device shutdown, ideal for use with anti-theft apps.☆18Dec 29, 2025Updated 2 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆16Sep 9, 2022Updated 3 years ago
- A command-line tool for testing RocketMQ vulnerabilities.☆13Feb 7, 2025Updated last year
- SQLiToolkit is a SQL injection Based Toolkit. There are many features such as Vulnerability Scanner, Url Fuzzer in this tool. This is a U…☆13Feb 8, 2022Updated 4 years ago
- Hacking Tricks, Techniques & Tools☆15Sep 18, 2020Updated 5 years ago
- Tool for finding Known Vulnerability of an ip address☆13Nov 13, 2024Updated last year
- Script para la extracción de datos y URL de páginas web.☆13Updated this week
- An online free tool to edit or preview markdown files created using nextjs & TypeScript 💕☆17Apr 23, 2025Updated 10 months ago
- It is a advanced keylogger.☆74Jul 2, 2024Updated last year
- A really good cybersec reading materials.☆13Aug 13, 2022Updated 3 years ago
- eBPF C programs injectable in a network card to extract packets' features for detecting different network attacks.☆14May 6, 2022Updated 3 years ago
- Boilerplate to Setup Authentication using Django-all auth 🚀☆14Aug 30, 2021Updated 4 years ago
- ☆14Jun 29, 2023Updated 2 years ago
- Compiler Design Project, Compiler with 4 stages i.e lexer, parser, intermediate code generator and optimizations on the icg with AST gene…☆14Feb 4, 2024Updated 2 years ago
- Golang Remote Desktop☆18Apr 15, 2023Updated 2 years ago
- 42 header for neovim made with lua☆11Aug 17, 2022Updated 3 years ago
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Aug 30, 2021Updated 4 years ago
- ☆22Jul 27, 2024Updated last year
- An efficient spyware that is barely undetectable by antiviruses and get execute every time the computer start.☆21Apr 18, 2024Updated last year
- Python RAT with reverse connection and asymmetric encrypted communications☆16Jun 30, 2020Updated 5 years ago
- i will upload all the books that helped me in learning in this repo☆21Jan 6, 2023Updated 3 years ago
- A collection of cyber tutorials including Python examples☆17Oct 10, 2022Updated 3 years ago
- Yandex browser passwords and credit-cards decryption algorithm☆22Apr 8, 2025Updated 10 months ago
- ☆16May 6, 2015Updated 10 years ago
- Restful Api developed with Flask using Prometheus and Grafana for monitoring and containerization with Docker☆16Jul 13, 2023Updated 2 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- Romania Problem with A* Algorithm - AI Class Homework☆11Aug 20, 2019Updated 6 years ago