w1f1t3kAl1
☆45Feb 16, 2024Updated 2 years ago
Alternatives and similar repositories for w1f1t3kAl1
Users that are interested in w1f1t3kAl1 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Feb 16, 2024Updated 2 years ago
- Another AMSI bypass - but in C++.☆25May 22, 2023Updated 2 years ago
- ☆17Jul 1, 2022Updated 3 years ago
- ☆15Nov 11, 2021Updated 4 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Control Pan, Tilt and Zoom (PTZ) on your webcam using OSC. Utilizes DirectShow.NET and SharpOSC.☆12Apr 30, 2023Updated 3 years ago
- CSI Linux Powerup utility☆14Feb 17, 2025Updated last year
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- this script will help you find favicon hashes which you can use to shodan to get more details about an asset☆31Mar 18, 2025Updated last year
- This is Same as Burpsuite Collaborator | Free | Burpsuite Collaborator Server☆13Jun 27, 2025Updated 10 months ago
- Small set of tools to generate plainmasterkeys (rainbowtables) and hashes for the use with latest hashcat and John the Ripper.☆117Jan 3, 2024Updated 2 years ago
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆17Oct 2, 2020Updated 5 years ago
- Symfony2 < 2.5.4 profiler exploit☆13Sep 30, 2015Updated 10 years ago
- Loader and RunPE file executer☆18Jun 12, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ⚔️ Red Team tools for capturing credentials & planting payloads using native Windows features.☆13Jan 25, 2026Updated 3 months ago
- Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking…☆11Aug 23, 2020Updated 5 years ago
- Exploit Pack - One step ahead☆11Sep 9, 2013Updated 12 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆33Aug 7, 2019Updated 6 years ago
- An android application for college which shows all the details of college with a gallery, notice board, faculty details and all the detai…☆10Mar 30, 2022Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- NOSNEX - Remake of fluxion for nethunter support☆10Jan 27, 2021Updated 5 years ago
- Web To App - Examples of how to port a Web or HTML5 game to a native Android, iOS and Mac OS X App☆20Oct 30, 2022Updated 3 years ago
- ☆18Apr 9, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Instagram Bruteforce For Hacking Instagram Accounts☆17Apr 4, 2020Updated 6 years ago
- C++ Code Injector Class☆22Oct 2, 2020Updated 5 years ago
- RedirectHunter is a powerful open redirect vulnerability scanner that helps you quickly identify and mitigate potential security risks in…☆13Apr 21, 2023Updated 3 years ago
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆21Jan 28, 2021Updated 5 years ago
- A powerful URL parameter and request fuzzing tool that processes URLs or Burp Suite raw requests, replacing values with custom payloads w…☆19Apr 12, 2026Updated 2 weeks ago
- ☆21Jun 29, 2022Updated 3 years ago
- WPA cracking tool for Android☆10Jul 17, 2020Updated 5 years ago
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform …☆16May 4, 2019Updated 6 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆18Oct 27, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This project contains source code of our Nexmon-based jammer app presented as a demo at WiSec 2017.☆18Nov 5, 2021Updated 4 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Jul 10, 2021Updated 4 years ago
- Yet another Windows DLL injector.☆40Nov 17, 2021Updated 4 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆35Jul 12, 2021Updated 4 years ago
- A simple script demonstrating the power that comes with SSID sniffing☆17May 7, 2019Updated 6 years ago