☆24Apr 25, 2019Updated 6 years ago
Alternatives and similar repositories for term-nh
Users that are interested in term-nh are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- EM4x RFID Harvester using a Robotics Connection reader☆16Sep 27, 2012Updated 13 years ago
- Various Wireless Driver patches☆34Apr 24, 2019Updated 6 years ago
- kali-sly-pi☆36Apr 24, 2019Updated 6 years ago
- gcc-arm-eabi-linaro-4.6.2☆26Apr 24, 2019Updated 6 years ago
- Kali Linux Windows App chroot builder script☆47Apr 24, 2019Updated 6 years ago
- ☆48Nov 28, 2016Updated 9 years ago
- ☆49Apr 24, 2019Updated 6 years ago
- Kali Linux u-boot images☆31Apr 24, 2019Updated 6 years ago
- Various Kali Scripts☆60Dec 20, 2016Updated 9 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆93Apr 24, 2019Updated 6 years ago
- Kali Linux NetHunter utils package☆114Apr 25, 2019Updated 6 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆187Apr 24, 2019Updated 6 years ago
- Reliable Teensy Penetration Testing Payload☆183Sep 17, 2012Updated 13 years ago
- NetHunter Devices☆268Apr 25, 2019Updated 6 years ago
- NetHunter android application☆336Apr 25, 2019Updated 6 years ago
- MASSCAN Web UI☆504Oct 26, 2022Updated 3 years ago
- {"event":[{"query":{"id":[{"timestamp_usec":"1440085742240272"}],"query_text":"webbrowserpassview display 4.0 11"}},{"query":{"id":[{"ti…☆16Jan 17, 2020Updated 6 years ago
- A simple "ransomware" using powershell☆14May 31, 2021Updated 4 years ago
- The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers☆460Nov 10, 2022Updated 3 years ago
- Kali Linux Recipes☆729May 1, 2019Updated 6 years ago
- Bootstrap course - Source code of the tutorial bootstrap in arabic which provided by engineer Shiyar Jamo on YouTube and Shiyar Academy☆14Nov 13, 2021Updated 4 years ago
- I force-push a lot between releases. You've been warned.☆18Oct 28, 2019Updated 6 years ago
- Remote Administration Tool for Windows☆19Sep 5, 2015Updated 10 years ago
- Curated list of public penetration testing reports released by several consulting firms☆12Aug 18, 2016Updated 9 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- Sources codes of the tutorial css in arabic which provided by engineer Shiyar Jamo on YouTube and Shiyar Academy☆25Sep 16, 2023Updated 2 years ago
- Android studio course -Source code of the tutorial Android studio in arabic which provided by engineer Shiyar Jamo on YouTube and Shiyar …☆22Dec 27, 2020Updated 5 years ago
- Python course - Source code of the tutorial Python in arabic which provided by engineer Shiyar Jamo (Coder Shiyar) on YouTube and Shiyar …☆18Jul 10, 2022Updated 3 years ago
- android project native programs and libraries☆29Apr 6, 2016Updated 9 years ago
- magic, in ball form☆60Oct 10, 2022Updated 3 years ago
- A simple compiling of notes and information / teachings on how stegonography works, and how we can use stegonography to execute system co…☆11Feb 27, 2022Updated 4 years ago
- ☆13May 14, 2022Updated 3 years ago
- The plugin allows you to hide and show comments, and saves them to a specified folder.☆14Apr 10, 2025Updated 11 months ago
- Android app to run duckyscript☆53Dec 30, 2021Updated 4 years ago
- mitmprotector - protect's you from any kind of MITM-attacks, arpspoofing, ettercap, sslstrip, droidsheep, zAnti, dsploit, etc.☆30Aug 17, 2023Updated 2 years ago
- a complete rewrite of wscript.exe, for *NIX☆13Nov 2, 2018Updated 7 years ago
- adb logcat console and web viewer☆51Mar 3, 2026Updated 2 weeks ago
- Executes all scripts in /data/data/com.termux/files/home/boot in separate termux-sessions, 5 minutes after boot.☆11Mar 10, 2019Updated 7 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago