Free Advance encryptor for Anon Cloud
☆16Jan 26, 2023Updated 3 years ago
Alternatives and similar repositories for ASSAMEE
Users that are interested in ASSAMEE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Apr 3, 2021Updated 5 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 4 years ago
- Site fast fuzzing with chorme extension.☆24Feb 4, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆81May 20, 2022Updated 3 years ago
- Small scripts and POCs related to digital forensics☆18Nov 1, 2022Updated 3 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- mift - a mobile image forensic toolkit☆47Nov 14, 2023Updated 2 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️☆26Jul 22, 2022Updated 3 years ago
- ☆17Jan 12, 2018Updated 8 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Static and dynamic Android application security analysis☆76Jun 2, 2024Updated last year
- Simple Malware Scanner written in python☆90May 10, 2025Updated 11 months ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- First iteration of ML based Feedback WAF☆59Mar 20, 2024Updated 2 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆16Nov 29, 2023Updated 2 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- Capstone disassembly framework: Core + Python + Ocaml + Java + C# bindings☆18Jan 25, 2014Updated 12 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆11Dec 7, 2017Updated 8 years ago
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- CTF designed for Middle School-aged kids☆12Oct 18, 2024Updated last year
- ☆12Nov 15, 2021Updated 4 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Nov 18, 2020Updated 5 years ago
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Oct 30, 2017Updated 8 years ago
- Rebane's CTF tools☆13Mar 23, 2026Updated 3 weeks ago
- 使用MiniDumpWriteDump与RtlReportSilentProcessExit实现提取lsass.dmp的工具☆12Dec 29, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- Two-factor Bitcoin (BIP38)☆36Mar 22, 2015Updated 11 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- Bash script for CTF automating basic enumeration☆41Mar 1, 2022Updated 4 years ago
- Devkit for quickly creating client bots for remote communications☆15Jun 17, 2025Updated 9 months ago