A frightfully intelligent algorithmic trading automaton of noble birth. Sir Reginald's prime directive: to acquire undervalued assets post-haste. Tally-ho, to the moon!
☆42Sep 18, 2025Updated 6 months ago
Alternatives and similar repositories for Sir-Reginald-Buys-The-Dips
Users that are interested in Sir-Reginald-Buys-The-Dips are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Red Team Tool Kit☆16Mar 10, 2019Updated 7 years ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆32Dec 31, 2025Updated 2 months ago
- Multilayered secret detection tool☆41Feb 11, 2026Updated last month
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆14Jun 11, 2025Updated 9 months ago
- Template used for my OSCP exam.☆29Aug 9, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Bitcoin miner by Raphael Frajuca(Badguy5552)☆11Oct 10, 2017Updated 8 years ago
- CA Issuers Monitor (Authority Info Access)☆14Mar 8, 2023Updated 3 years ago
- Collection of patches I apply to my personal GrapheneOS builds☆21Mar 6, 2026Updated 3 weeks ago
- Scripts that automate portions of pentests.☆58Mar 18, 2026Updated last week
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆24Feb 23, 2026Updated last month
- ☆12Nov 13, 2019Updated 6 years ago
- T&C and Privacy Policy for our website: https://radicallyopensecurity.com/☆17Dec 9, 2024Updated last year
- Learn how to intercept flutter apps☆25Jan 19, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- ollvm, based on llvm-clang 5.0.2, 6.0.1, 7.0.1, 8.0, 9.0, 9.0.1☆19Apr 4, 2022Updated 3 years ago
- Termux interactive package installer☆13Feb 2, 2026Updated last month
- A custom script I created because I got tired of installing my tools manually!☆13Nov 19, 2024Updated last year
- Official code for the paper "Adversarial Magnification to Deceive Deepfake Detection through Super Resolution"☆12Jun 26, 2023Updated 2 years ago
- Sample code for exfiltrating data through an XSS vulnerability. XSS Payload retrieves sensitive data in victim's browser, then breaks it …☆21May 11, 2021Updated 4 years ago
- Complete collection of bug bounty reports from Hackerone.☆45Oct 13, 2024Updated last year
- SafeCrypt is an academic ransomware simulation suite developed for Red Team engagements. It demonstrates modern malware techniques includ…☆33Oct 3, 2025Updated 5 months ago
- Analyzes software dependencies across GitHub repositories to identify security vulnerabilities and health risks in your supply chain.☆122Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Jailbreak detection bypass for the iOSSecuritySuite Swift library☆17Feb 18, 2024Updated 2 years ago
- C# Implementation of Get-VaultCredential☆14Jul 31, 2018Updated 7 years ago
- Fastest getgrass.io coin mining, Supports multiple accounts, Easy to use WebUI, Proxy support for each account, Docker support for easy d…☆14Apr 23, 2024Updated last year
- iOS SSL Bypass & Real-Time Traffic Monitor – A Frida-based script for bypassing SSL pinning and monitoring network traffic on iOS apps in…☆20Mar 11, 2025Updated last year
- ☆26Apr 29, 2025Updated 11 months ago
- PoC of Imagemagick's Arbitrary File Read☆13Jul 3, 2023Updated 2 years ago
- Adobe Experience Manager (AEM) hacking toolkit☆109Sep 26, 2025Updated 6 months ago
- Mujde☆25Apr 25, 2025Updated 11 months ago
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆60Nov 24, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- sideload apps quickly with an Apple Developer account☆17Jul 26, 2016Updated 9 years ago
- A Multilayered AV/EDR Evasion Framework and AV Testing Tool.☆18Jun 28, 2025Updated 9 months ago
- Proof of Concepts for malicious maintainers: How to Tamper with Releases built with GitHub Actions Worfklows, presented at fwd:cloudsec E…☆82Sep 16, 2025Updated 6 months ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Sonarr | Radarr | Jackett | NZBGet | Deluge | Plex | Jellyfin | Ombi | Tautulli | Netdata | Dashmachine | FileBrowser | Lidarr | Samba |…☆11Sep 19, 2023Updated 2 years ago