n3mu3lw / RavenView external linksLinks
Fairly Undetectable Linux Spyware
☆18Mar 1, 2023Updated 2 years ago
Alternatives and similar repositories for Raven
Users that are interested in Raven are comparing it to the libraries listed below
Sorting:
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 8 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- AirBnB_clone team project☆11Nov 27, 2022Updated 3 years ago
- CMSC389R course at UMD☆10Oct 2, 2019Updated 6 years ago
- ☆10Feb 6, 2020Updated 6 years ago
- Ray-casting game for wasting productive time.☆11May 23, 2021Updated 4 years ago
- bugreport☆13May 19, 2019Updated 6 years ago
- Script para la extracción de datos y URL de páginas web.☆12Feb 5, 2026Updated last week
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 2 years ago
- Resources to learn tech (sharing useful links)☆17Oct 26, 2021Updated 4 years ago
- Lists of hacking: Blog, Forums, Telegram channel and all kind of resources in spanish and english.☆15Mar 7, 2021Updated 4 years ago
- Hacking Tricks, Techniques & Tools☆15Sep 18, 2020Updated 5 years ago
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Nov 27, 2025Updated 2 months ago
- A command-line tool for testing RocketMQ vulnerabilities.☆13Feb 7, 2025Updated last year
- SQLiToolkit is a SQL injection Based Toolkit. There are many features such as Vulnerability Scanner, Url Fuzzer in this tool. This is a U…☆13Feb 8, 2022Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆16Sep 9, 2022Updated 3 years ago
- Boilerplate to Setup Authentication using Django-all auth 🚀☆14Aug 30, 2021Updated 4 years ago
- ☆14Jun 29, 2023Updated 2 years ago
- A really good cybersec reading materials.☆13Aug 13, 2022Updated 3 years ago
- 42 header for neovim made with lua☆11Aug 17, 2022Updated 3 years ago
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Aug 30, 2021Updated 4 years ago
- ☆16May 6, 2015Updated 10 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- A collection of cyber tutorials including Python examples☆17Oct 10, 2022Updated 3 years ago
- An unfinished project. HTTP botnet coded in VB.net and PHP.☆16Aug 17, 2015Updated 10 years ago
- Restful Api developed with Flask using Prometheus and Grafana for monitoring and containerization with Docker☆16Jul 13, 2023Updated 2 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- A potent tool designed for efficiently cracking MD5 hashes using an online wordlist. This repository provides a robust solution for secur…☆13Jul 26, 2024Updated last year
- A Next.js, Tailwind CSS blogging Template. Used to Create my Blog☆23Jun 1, 2023Updated 2 years ago
- ☆15Jul 24, 2021Updated 4 years ago
- Material do curso de Hardware Hacking da ACADITI☆23Jan 13, 2020Updated 6 years ago
- dvp-pc : keep code☆17Jun 14, 2018Updated 7 years ago
- Romania Problem with A* Algorithm - AI Class Homework☆11Aug 20, 2019Updated 6 years ago
- Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin <= 5.7.14 - Unauthenticated SQL Injection☆20Sep 15, 2024Updated last year
- SQL Detector Tool In Go Language☆22Jan 10, 2023Updated 3 years ago
- IP Tools To quickly get information about IP Address's, Web Pages and DNS records.☆19Dec 13, 2020Updated 5 years ago
- Trojan Rat Builder(348), Ransomware Builder(17), Crypter(110), Miner(9), Worm(8), Botnet(49), Virus Builder(62), Binder(35), Exploit(42),…☆21Mar 29, 2022Updated 3 years ago