Driver Attack Platform for Linux
☆18Mar 2, 2023Updated 3 years ago
Alternatives and similar repositories for dapr
Users that are interested in dapr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Oct 22, 2020Updated 5 years ago
- A tool to extract RTTI information from Delphi executables, written in pure Python☆23Mar 11, 2020Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41May 17, 2019Updated 6 years ago
- Toolkit developed to reverse engineer Google's Nearby Connections API☆23Dec 11, 2018Updated 7 years ago
- ☆10Feb 3, 2021Updated 5 years ago
- A Android program help you learn English.☆13Mar 18, 2024Updated 2 years ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆42Nov 10, 2025Updated 4 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Nmap results are a semigroup☆13Jul 8, 2021Updated 4 years ago
- ☆11Jun 22, 2020Updated 5 years ago
- Fake AccessPoint Attack☆31Jul 27, 2018Updated 7 years ago
- simple script to pwn android phone with physical access☆26Dec 22, 2018Updated 7 years ago
- autoscan - automatic fingerprint of visited networks☆11Nov 2, 2013Updated 12 years ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- A tool to generate fake profile for filling of form☆11Apr 30, 2023Updated 2 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- A web app scanner☆24Jan 23, 2014Updated 12 years ago
- Shodan Port Scanner☆43Sep 30, 2020Updated 5 years ago
- exploitation of php use-after-free vulnerabilities on 64 bit systems | poc||gtfo☆12Apr 8, 2015Updated 10 years ago
- 382 Slayer Leecher Keywords.☆10Apr 19, 2021Updated 4 years ago
- ☆18Oct 12, 2021Updated 4 years ago
- Preview Zig's incremental linker state in interactive HTML☆45Mar 17, 2022Updated 4 years ago
- A module for normalising text.☆10Nov 6, 2019Updated 6 years ago
- An OSINT tool to find data leaks on a targeted website☆17Mar 30, 2021Updated 4 years ago
- Dll injection for executable file☆17Jul 22, 2016Updated 9 years ago
- Learn T-SQL Querying, Second Edition, published by Packt☆14Mar 11, 2024Updated 2 years ago
- Penetration Testing / OSCP Biggest Reference Bank / Cheatsheet☆13Dec 9, 2018Updated 7 years ago
- Quick-start tutorial for specifying a new processor in ghidra☆14Nov 24, 2021Updated 4 years ago
- A CLI tool and library allowing to simply decode all kind of BigIP cookies.☆39Jul 7, 2020Updated 5 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Nov 7, 2022Updated 3 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆621Oct 6, 2025Updated 5 months ago
- a tools to convert audio to a image like http://weavesilk.com/ display☆14Jan 24, 2015Updated 11 years ago
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Mar 28, 2025Updated 11 months ago
- HTTP load testing tool powered by Rust☆14Aug 14, 2018Updated 7 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆40Jun 26, 2020Updated 5 years ago
- ☆11Sep 29, 2023Updated 2 years ago