☆46Nov 7, 2023Updated 2 years ago
Alternatives and similar repositories for https-github.com-skizzophrenic-ubers-sd-files
Users that are interested in https-github.com-skizzophrenic-ubers-sd-files are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- iOS 17.2 Jailbreak and Jailbreak guides and Download links☆10Nov 1, 2023Updated 2 years ago
- ☆12Jul 10, 2023Updated 2 years ago
- My apps for Flipper Zero☆10Apr 29, 2024Updated last year
- Flipper Zero app for tracking USDA fc2 animal tracking tags☆22Apr 1, 2025Updated 11 months ago
- Talk2Me interacts with OpenAI's language model to generate text responses and saves the conversation for future reference.☆15Sep 6, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- EMVLogger is an open-source tool for testing and analyzing EMV chip cards and transaction logs using a comprehensive EMV Kernel Library. …☆13Jun 15, 2024Updated last year
- guide to master the flipepr for beginners☆21Sep 17, 2022Updated 3 years ago
- All‑in‑one Bruce firmware scripts: RFID, NFC, IR, Sub‑GHz & more.☆64Mar 17, 2026Updated last week
- ☆12Jan 14, 2019Updated 7 years ago
- React Native integration for ID TECH's magstripe readers using the audio jack☆13Mar 15, 2023Updated 3 years ago
- Specify what you want it to build, the AI asks for clarification, and then builds it.☆37Sep 24, 2024Updated last year
- EVM Emergency wallet drainer☆11Aug 2, 2023Updated 2 years ago
- ☆31Jan 29, 2016Updated 10 years ago
- Who We Are☆22Sep 6, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Black Hat Ethical Hacking - Official Theme for Conky Manager☆18Sep 6, 2024Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- Some mind maps that are related to the CompTIA Security + exam topics.☆22Sep 25, 2020Updated 5 years ago
- ☆27Oct 15, 2025Updated 5 months ago
- Bypass CloudFlare to find real IP address☆20Nov 27, 2018Updated 7 years ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆16Sep 8, 2023Updated 2 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆20Nov 21, 2018Updated 7 years ago
- ☆49Nov 19, 2023Updated 2 years ago
- Wraps a powershell script from kali linux to Flipper Zero BadUSB☆15Sep 27, 2025Updated 6 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Flipper Zero Code-Grabber Firmware☆23May 28, 2023Updated 2 years ago
- This software implements an USB to CAN bridge compatible with Linux can-utils and slcan driver. This software application is designed to…☆22Feb 20, 2025Updated last year
- Built binaries of Marlin based on published Marlin Configurations.☆40Jan 23, 2026Updated 2 months ago
- Complete Malware Index - Use at your own Risk!☆19Sep 2, 2024Updated last year
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆26Sep 6, 2024Updated last year
- ☆15Feb 1, 2025Updated last year
- This repository enables learners to perform front-end full stack development, with emphasis on employability skills. The repository cover…☆13Feb 20, 2024Updated 2 years ago
- example on how to use the chatGPT api with powershell☆67Apr 23, 2023Updated 2 years ago
- Subdomain Bruteforce - Bounty Quick Code☆31Sep 6, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆21Mar 30, 2018Updated 7 years ago
- ☆60Aug 6, 2024Updated last year
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆44Sep 6, 2024Updated last year
- Talk to ChatGPT using your voice, and have it respond back to you with a voice. You can now talk to GPT using your voice or through the t…☆18May 12, 2023Updated 2 years ago
- WH RAT V2 2022☆25Jan 19, 2024Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Sep 6, 2024Updated last year
- ☆24Feb 9, 2025Updated last year