☆28Jun 12, 2013Updated 12 years ago
Alternatives and similar repositories for android-forkbomb
Users that are interested in android-forkbomb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Morula is a secure replacement of Zygote to fortify weakened ASLR on Android☆15Aug 23, 2014Updated 11 years ago
- Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample-f…☆47Apr 23, 2021Updated 4 years ago
- Reverse AIDL tool☆45Apr 1, 2015Updated 10 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A simple compiling of notes and information / teachings on how stegonography works, and how we can use stegonography to execute system co…☆11Feb 27, 2022Updated 4 years ago
- All-languages fork bombs☆14Jan 2, 2022Updated 4 years ago
- ☆11Mar 26, 2018Updated 8 years ago
- a poc of Android bug 17356824☆55Nov 26, 2014Updated 11 years ago
- android app for malware detection☆28Jan 6, 2018Updated 8 years ago
- :(){ :|: };: 💣 Fork bombs (wabbits) in many languages. Spot them before executing any code so that you can prevent yourself from acciden…☆44Oct 23, 2022Updated 3 years ago
- A Simple Http to Raw Socket Adapter for Android☆12Aug 30, 2015Updated 10 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Ini adalah kumpulan webshell atau backdoor yang lengkap☆18Aug 18, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Oauth2 plugin for graylog project☆16Oct 3, 2021Updated 4 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- Magellan PoC☆34Jan 23, 2019Updated 7 years ago
- Report S3 disk usage stats, including revisions and deleted files☆16Apr 20, 2022Updated 3 years ago
- A small stuff of telegram bot for pentest and information gathering.☆11Oct 3, 2020Updated 5 years ago
- iCTF 2013 service based on a DalvikVM☆22Dec 10, 2013Updated 12 years ago
- Simple JS script that overloads the browser with a huge URL☆13May 27, 2020Updated 5 years ago
- ☆21Dec 18, 2013Updated 12 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Android FakeID Exploit☆21Aug 7, 2014Updated 11 years ago
- Zipper data structure for Java☆14Sep 10, 2009Updated 16 years ago
- ☆11May 8, 2019Updated 6 years ago
- Web based Gitolite Manager, written with node.js over express.js☆19Jul 23, 2011Updated 14 years ago
- MISP - Ansible installation script☆23Feb 16, 2019Updated 7 years ago
- A bot to quickly get information about an IP, useful to get threat intelligence informations for blue team.☆12Apr 14, 2025Updated 11 months ago
- An Android port of the general purpose honggfuzz fuzzer☆19Aug 20, 2015Updated 10 years ago
- Example of how to catch USSD responses in Android☆10Dec 3, 2014Updated 11 years ago
- A simple python script to punish credit card scammers.☆14Apr 10, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- StringEncrypt allows you to encrypt strings and files using a randomly generated algorithm, generating a unique decryption code (so-calle…☆23Mar 11, 2023Updated 3 years ago
- ☆18May 23, 2024Updated last year
- ☆17Aug 20, 2014Updated 11 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆12May 14, 2016Updated 9 years ago
- ☆18Sep 22, 2017Updated 8 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Java Native Access☆23Mar 21, 2012Updated 14 years ago