rsathishtechit / udeler-proView external linksLinks
Desktop application to download Udemy courses with attachments.
☆15Nov 8, 2025Updated 3 months ago
Alternatives and similar repositories for udeler-pro
Users that are interested in udeler-pro are comparing it to the libraries listed below
Sorting:
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- The official Bento distribution - orchestration and deployment infrastructure for the Bento platform.☆11Updated this week
- Relational Algebra + SQL tool.☆13Feb 6, 2019Updated 7 years ago
- ☆15Dec 3, 2020Updated 5 years ago
- Open http links in the most recently used browser instead of a default.☆22May 22, 2021Updated 4 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- ChatGPT-like chat bot webapp built with React, Express and TailwindCSS using ollama.ai as backend.☆13Nov 23, 2023Updated 2 years ago
- Password obfuscator for vpnc config files (beware that passwords can be deobfuscated using cisco-decrypt!!!)☆10Mar 19, 2020Updated 5 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 8 years ago
- Testing tools for Oracle Forms☆13Oct 23, 2025Updated 3 months ago
- All Base libraries decryption tool☆14Jan 2, 2022Updated 4 years ago
- router firmwares, reverse engineering code snippets, mitm tools☆14Mar 20, 2020Updated 5 years ago
- ☆10Dec 6, 2023Updated 2 years ago
- A lightweight macOS menu bar utility for real-time system metrics—monitoring CPU, memory, network, ports, and battery, all at a glance☆14Sep 23, 2025Updated 4 months ago
- NetBIOS Name Service spoofing tool☆14Feb 7, 2014Updated 12 years ago
- Read Registry.pol files on Linux, or anywhere Python runs!☆17Jun 12, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆16Sep 9, 2022Updated 3 years ago
- This repository is for mobile app penetration testing checklist☆15Dec 7, 2021Updated 4 years ago
- ☆13Oct 31, 2022Updated 3 years ago
- Google Dork Scanner for Google Chrome Extension☆17May 10, 2025Updated 9 months ago
- Xamarin sample application that demonstrates certificate public key pinning.☆13Aug 22, 2018Updated 7 years ago
- Open source Java Card applet that allows you to unlock, start, or lock a Tesla Model 3 just like the official key card☆15Oct 19, 2025Updated 3 months ago
- Bash Shell Script Cryptography☆13Jan 2, 2022Updated 4 years ago
- All-languages fork bombs☆14Jan 2, 2022Updated 4 years ago
- All my blogs for ExpDev, HTB, BinaryExploit, Etc.☆13Jul 17, 2024Updated last year
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- This tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse pr…☆14Feb 20, 2023Updated 2 years ago
- SApCap is a SAP packet sniffer and decompression tool for analysing SAP GUI (DIAG) traffic☆17Apr 20, 2017Updated 8 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Jan 19, 2021Updated 5 years ago
- Library for encrypt and decrypt using RSA public and private key☆12Sep 23, 2018Updated 7 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆16May 17, 2025Updated 8 months ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Jun 9, 2021Updated 4 years ago
- Yet another OSINT automator.☆18Nov 15, 2020Updated 5 years ago
- Stand-alone copy of Androguard from http://code.google.com/p/androguard/☆16Mar 13, 2014Updated 11 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim…☆16Aug 13, 2019Updated 6 years ago
- Covert Communication Network☆19Mar 22, 2017Updated 8 years ago