Diablo4 Utility Bot
☆25Mar 16, 2025Updated 11 months ago
Alternatives and similar repositories for black-book
Users that are interested in black-book are comparing it to the libraries listed below
Sorting:
- Android Google Map 2 Project to find friend location with live movement.☆10Feb 9, 2015Updated 11 years ago
- Launcher for the fifa live editor☆10Updated this week
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- ☆16Apr 1, 2022Updated 3 years ago
- A fluent SQLite Query API for Android☆20Jun 12, 2016Updated 9 years ago
- Board layout☆13Jul 1, 2015Updated 10 years ago
- Analysis of Hearthstone replays☆11May 18, 2017Updated 8 years ago
- EDID (Enhanced Display Identification Data) Fuzzer☆19Nov 5, 2013Updated 12 years ago
- AES GCM : Authenticated Encryption with Associated Data (AEAD) algorithm in Go language☆11Jan 5, 2016Updated 10 years ago
- ☆12Jan 25, 2016Updated 10 years ago
- My website☆13Jan 24, 2026Updated last month
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- This Python script cracks passwords using a brute force approach that generates all possible character combinations. It can be customized…☆14May 1, 2023Updated 2 years ago
- A powerful capture and injection tool for the Android platform☆12May 4, 2020Updated 5 years ago
- Security based project. Create a phising page and push it either locally or on-line!☆17Jun 4, 2023Updated 2 years ago
- Hearthstone fatigue tracker (HDT Plugin)☆13Jun 13, 2017Updated 8 years ago
- Tesseract bindings for .NET☆14Oct 11, 2022Updated 3 years ago
- A library to use and communicate with the EA FC web app API.☆22Oct 7, 2025Updated 5 months ago
- MagSpoof is a portable device that can spoof/emulate any magnetic stripe or credit card "wirelessly", even on standard magstripe readers.☆16Nov 25, 2015Updated 10 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆13Aug 9, 2016Updated 9 years ago
- Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions☆12Apr 24, 2017Updated 8 years ago
- This boilerplate contains all the tools you need to build a modern Overwolf app with TypeScript, React, Vite, Storybook and Express.☆13Jul 18, 2021Updated 4 years ago
- Hacker Inside Dude☆12Nov 29, 2018Updated 7 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- Tool to create database of FIFA football player ratings☆11Sep 2, 2018Updated 7 years ago
- Get call log details after ending call☆15Jan 2, 2015Updated 11 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- ☆14Jan 16, 2023Updated 3 years ago
- Tools to decrypt Google Chrome, Mozilla Firefox and Microsoft Edge login/password information.☆17Apr 10, 2023Updated 2 years ago
- Red Team Tool Kit☆16Mar 10, 2019Updated 7 years ago
- SQL Code Assistant Plugin for Intellij IDEA☆24Aug 16, 2014Updated 11 years ago
- RTL8812AU/21AU and RTL8814AU driver with monitor mode and frame injection☆16Dec 24, 2017Updated 8 years ago
- Website for the Routerkeygen Project☆18Feb 22, 2018Updated 8 years ago
- Machines created to speed up analysis inside of Maltego☆16Mar 17, 2016Updated 9 years ago
- The ExploitToolFinder Utility [by exploitsecurity.io] assists security researchers in their quest to find the right tool for the job☆17Jun 21, 2023Updated 2 years ago
- Get Meta Stats for Hearthstone using actual user data☆12Apr 5, 2017Updated 8 years ago
- OWASP Droid10 is an opensource handheld system based (android) web application pen testing tool. It can scan for web application vulnera…☆17Jan 23, 2022Updated 4 years ago
- Bluetooth device and service discovery tool that can be used for security assessment and penetration testing☆16Dec 15, 2015Updated 10 years ago
- ☆21Jul 15, 2016Updated 9 years ago