BASH + VIM = Cryptolocker
☆11Jul 31, 2018Updated 7 years ago
Alternatives and similar repositories for VIM-Locker
Users that are interested in VIM-Locker are comparing it to the libraries listed below
Sorting:
- 🌎 A command-line application to help determine the location information from a given ip address or url.☆21Mar 29, 2017Updated 8 years ago
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 8 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- A command-line application to generate random user agent strings.☆17Mar 20, 2020Updated 6 years ago
- 🦑 A friendly Ruby API to iptables.☆15May 6, 2017Updated 8 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Automatically commit changes to git repository for rapid development. Python/inotify☆12Aug 24, 2016Updated 9 years ago
- 🎻 Tools for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.☆32Jul 15, 2017Updated 8 years ago
- CircleCI log and security configuration automations☆22Sep 20, 2020Updated 5 years ago
- A horizontal and vertical web content enumerator☆52Aug 15, 2018Updated 7 years ago
- Git hooks for TaskWarrior☆15Aug 25, 2021Updated 4 years ago
- Disables all WordPress updates, including core, plugin and theme update checks.☆10Jul 18, 2021Updated 4 years ago
- A helper for Ledger (http://www.ledger-cli.org/).☆17Oct 20, 2018Updated 7 years ago
- Creates task in taskwarrior from email within mutt☆18Apr 18, 2024Updated last year
- ☆11Sep 21, 2019Updated 6 years ago
- a zsh plugin for pipenv☆18Aug 13, 2019Updated 6 years ago
- ViewState Payload Generator☆26Aug 17, 2018Updated 7 years ago
- Binary Ninja Posters☆35Oct 14, 2020Updated 5 years ago
- "What To" guide for finding vulnerabilities in sites.☆21Jul 22, 2017Updated 8 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Sep 19, 2017Updated 8 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- Price sources for Beancount that provide prices for various cryptoassets☆19Mar 7, 2026Updated 2 weeks ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- World Fastest MD5 cracker☆13Feb 10, 2020Updated 6 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- ☆20Jan 25, 2019Updated 7 years ago
- Script to generate a WordPress site in an LXD container.☆17Aug 25, 2020Updated 5 years ago
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- 🕶 Cross-platform network interface command-line utility.