Exploit web-vulnerabilities
☆23Apr 9, 2019Updated 6 years ago
Alternatives and similar repositories for web-cheats
Users that are interested in web-cheats are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Presence application built during Microsoft's Code.Fun.Do 2k18☆25Oct 30, 2018Updated 7 years ago
- ☆10Mar 31, 2023Updated 2 years ago
- A karaoke app in virtual reality☆13Nov 15, 2019Updated 6 years ago
- A 32-bit RISC processor implementation in verilog☆21Oct 2, 2018Updated 7 years ago
- MVC framework generator☆21Jul 5, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A library of common data structures or algorithms. Used mainly in programming contests.☆40Jun 11, 2024Updated last year
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 8 years ago
- My solutions to the machine learning course by Andrew Ng on coursera☆10Oct 22, 2018Updated 7 years ago
- A terrible terrible soft-keyboard that randomises keys on every press.☆18Nov 27, 2016Updated 9 years ago
- RECon 2017 IDA skin & color scheme☆28Jun 16, 2017Updated 8 years ago
- ✉️ A new way to display the android notifications in the status bar.☆33Feb 17, 2018Updated 8 years ago
- Our recruitment page☆13Mar 31, 2022Updated 3 years ago
- Windows privilege escalation workstation☆17Nov 22, 2015Updated 10 years ago
- Get a clean, ready-to-go Linux box in seconds.☆25Mar 12, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Keylogger using FTP server as an intermediate with some cool additional functions☆22Apr 15, 2017Updated 8 years ago
- Download any music from web☆39Jun 2, 2019Updated 6 years ago
- Stream music over a network port.☆35Oct 30, 2017Updated 8 years ago
- ☆19Jan 30, 2016Updated 10 years ago
- MiniPwner's website and forums aren't exactly clear on what you need to do. I'm here to help!☆20Jan 15, 2016Updated 10 years ago
- Tools of the trade☆85Sep 6, 2022Updated 3 years ago
- An attempt to unite CTF players and bug bounty hunters by sharing a binary that needs CTF-style attention.☆18Sep 3, 2024Updated last year
- CryptoGuy is a tool usefull to find out various decryptions of a string☆25Mar 22, 2015Updated 11 years ago
- Pixel-perfect replica of Windows 10, simulated in the browser with Vanilla JS.☆17Dec 16, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Reproducing the paper "Kernel-Based Approaches for Sequence Modeling: Connections to Neural Methods"☆40Dec 29, 2019Updated 6 years ago
- Todos los scripts y locuras del Blog SniferL4bs que sean desarrollados vendran en esta pequeña sección dedicada☆21Jun 22, 2024Updated last year
- AN ESP32/8266 is used to receive sensor data from clients and then log and display the results☆22Sep 24, 2022Updated 3 years ago
- Cracking real-world Crypto, the fun way☆20Dec 7, 2016Updated 9 years ago
- Source Code for the Home Server setup.☆60May 8, 2025Updated 10 months ago
- Lightweight server access management system, written in Rust☆44Feb 9, 2026Updated last month
- ☆81Jun 12, 2017Updated 8 years ago
- ☆25Jan 6, 2016Updated 10 years ago
- Simple single cycle RISC processor written in Verilog☆49Mar 23, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- some example ctf writeups☆27Oct 23, 2020Updated 5 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 8 months ago
- Hassle free .gitignore manager☆35Jul 14, 2019Updated 6 years ago
- Masking the Sethc.exe backdoor with an anti-detection system.☆29Dec 16, 2017Updated 8 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap☆167May 10, 2018Updated 7 years ago
- A reverse shell cheat-sheet tool☆39Mar 5, 2019Updated 7 years ago