My most advanced framework yet!!
☆39May 16, 2023Updated 2 years ago
Alternatives and similar repositories for Trity-1
Users that are interested in Trity-1 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remot Desktop Checker (Au3-Source)☆10Jun 25, 2018Updated 7 years ago
- Quack Toolkit is a set of a denial of service attack methods. Quack includes SMS attack method, HTTP attack method and many other attack …☆16Feb 12, 2020Updated 6 years ago
- Linkedin crawler to search and collect my connections (profile picture, name, occupation, location, email and phone).☆11Jun 26, 2018Updated 7 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Simple Python Script to bypass Facebook profile picture guard and get the profile picture at full resolution☆13Oct 23, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A PoC for a mass connect LinkedIn script. It just sends an invite to everyone within a specific search page.☆13Sep 27, 2019Updated 6 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- ☆15Jan 24, 2023Updated 3 years ago
- ☆19May 1, 2023Updated 2 years ago
- Github Action to make a change to a JSON file☆12May 13, 2020Updated 5 years ago
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year
- ⛷ A collection of hacker scripts.☆28Jan 24, 2017Updated 9 years ago
- Wireless discovery and exploitation framework written in Python☆18Dec 17, 2010Updated 15 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 6 years ago
- instagram için takipçi ve beğeni paneli☆10Feb 17, 2019Updated 7 years ago
- Install Metasploit Framework 6 in Termux☆11Nov 28, 2020Updated 5 years ago
- A simple compiling of notes and information / teachings on how stegonography works, and how we can use stegonography to execute system co…☆11Feb 27, 2022Updated 4 years ago
- Automatic Ducky Payload Generator☆16Nov 14, 2022Updated 3 years ago
- Arduino code and board schematics to generate dtmf tones and transmit on a phone line☆14Jul 27, 2009Updated 16 years ago
- Scripts for starting, stopping, checking setup and others ported from Kali Linux for general systemd systems☆17Jun 8, 2017Updated 8 years ago
- ☆13May 14, 2022Updated 3 years ago
- ☆20Aug 16, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A multifunctional Android RAT with GUI based Web Panel without port forwarding.☆11Dec 18, 2022Updated 3 years ago
- Website☆12Jan 10, 2023Updated 3 years ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago
- AFOS Package Manager☆10May 2, 2021Updated 4 years ago
- Tool for fetching all the available waybackmachine snapshot urls☆24Oct 8, 2024Updated last year
- ☆11Aug 26, 2024Updated last year
- Beautifully display social media and contact info on your website with these simple widgets.☆15Dec 6, 2022Updated 3 years ago
- ☆11Feb 27, 2022Updated 4 years ago
- A simple SystemVerilog digital phase-locked loop based (roughly) on TI's SDLA005B application note. The design includes a SystemVerilog t…☆15Aug 29, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Encryption and signing for a post quantum world☆17Apr 4, 2023Updated 2 years ago
- RouterBrute can Bruteforce/Dictionary attack the login for the Router's Login page☆16Mar 27, 2017Updated 9 years ago
- ☆33Sep 9, 2023Updated 2 years ago
- ☆11May 19, 2021Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- [NEW] : EMAIL BOUNCE CHECKER V1 - EMAIL ACCESS VERIFY CHECKER☆31Feb 21, 2023Updated 3 years ago
- My PowerShell bag of tricks☆26Aug 2, 2017Updated 8 years ago