ollipal / classified.htmlLinks
☆44Updated 3 years ago
Alternatives and similar repositories for classified.html
Users that are interested in classified.html are comparing it to the libraries listed below
Sorting:
- Web on top of any protocol☆113Updated 5 years ago
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆73Updated 2 years ago
- edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of …☆51Updated 8 months ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Updated 3 years ago
- Grep Web pages with extra features like JS deobfuscation and OCR☆110Updated last year
- OnionShare; no Flask, just redbean.☆42Updated 2 years ago
- Let's brute force this hotel's tv.☆82Updated 5 years ago
- Using Telegram's "People Nearby" feature to pinpoint people (technically) around the globe☆86Updated 4 years ago
- Create automated tasks and keep an eye on interesting things!☆83Updated 6 months ago
- Tooling to retrieve data from Axon2 Body Cams☆48Updated 4 years ago
- Notes regarding CVE-2021-3156: Heap-Based Buffer Overflow in Sudo☆39Updated 4 years ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆110Updated 11 months ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 6 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- GO sandbox to run untrusted code☆42Updated 5 years ago
- Find utility wrapper in Bash to friendly, quickly, exhaustively search, filter, list, etc file system☆17Updated 4 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆77Updated 5 years ago
- ☆39Updated last year
- Detecting SNI based censorship using Iterative Network Tracing☆14Updated 3 years ago
- PoC to demonstrate how local service discovery can be used to violate privacy.☆47Updated 3 years ago
- Free, open-source, decentralized and encrypted filesharing.☆114Updated 2 years ago
- iWar - The intelligent war dialer.☆28Updated 5 years ago
- ☆23Updated last year
- The "hunter2" password manager is a simple script-oriented password manager.☆15Updated 6 years ago
- A simple shell utility for encrypting and decrypting files using OpenSSL.☆142Updated 2 months ago
- A tiny set of helper scripts for ipinfo☆17Updated 5 years ago
- An experiment to host a website with the content served over DNS.☆27Updated 2 years ago
- Codename generator using WordNet parts of speech database☆29Updated 3 years ago
- Get and extract the frontend code of a SPA, finding all chunks and recreating the original code from source maps. Should support common w…☆18Updated last month
- Generates self-contained HTML files protecting secret text content.☆155Updated 10 months ago