☆22May 22, 2024Updated 2 years ago
Alternatives and similar repositories for oh-my-zsh
Users that are interested in oh-my-zsh are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Apr 2, 2022Updated 4 years ago
- SQL Detector Tool In Go Language☆22Jan 10, 2023Updated 3 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- A NixOS Module for setting up easyroam☆18Jan 29, 2026Updated 3 months ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Jul 2, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 3 years ago
- An open-source toolkit for analyzing line-oriented JSON Twitter archives with Apache Spark.☆10Mar 17, 2026Updated 2 months ago
- WiFiDuck for whid injector☆15Apr 13, 2022Updated 4 years ago
- A Wayland/Hyprland Desktop Shell based on Aylur's GTK Shell☆24Dec 17, 2024Updated last year
- Here will be a rom and kernel downloads☆11Sep 10, 2020Updated 5 years ago
- Official Python package for ArchiveBox, the self-hosted internet archiving solution.☆12Oct 5, 2024Updated last year
- bluebinder is a simple proxy for using android binder based bluetooth through vhci.☆11May 5, 2026Updated 2 weeks ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 8 years ago
- ☆16May 15, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- OSINT Tool In GOLang☆12Jan 31, 2023Updated 3 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 3 years ago
- burp extender for fuzzing☆10Aug 10, 2018Updated 7 years ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 3 years ago
- Function ID for Malware Analysis☆13Jul 6, 2020Updated 5 years ago
- E-mails, subdomains and names Harvester - OSINT☆11Jan 17, 2020Updated 6 years ago
- ☆15Updated this week
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- ☆13May 19, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆10Aug 20, 2020Updated 5 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 3 months ago
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- Sublime Text plugin to run eslint --fix on the current file☆10Mar 21, 2024Updated 2 years ago
- A tiny lazy objective functional language☆19Sep 12, 2024Updated last year
- ☆12Feb 8, 2021Updated 5 years ago
- T&C and Privacy Policy for our website: https://radicallyopensecurity.com/☆17Apr 23, 2026Updated 3 weeks ago
- Nethunter Kernel for Samsung S23 Ultra (dm3q)☆12Nov 4, 2023Updated 2 years ago
- ☆10Dec 6, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Data EXfiltration TestER☆21Aug 28, 2019Updated 6 years ago
- This repository contains examples of information security policies, GDPR protocols and an operational security guide with examples of bes…☆13Apr 21, 2026Updated last month
- Multithreaded Host Header Redirection Scanner☆14Nov 10, 2020Updated 5 years ago
- Nethunter kernel for the POCO X3 Pro (vayu) based on crDroid's kernel.☆24Updated this week
- Project Interoperability: A Start-Up Guide to Info Sharing☆29Nov 22, 2016Updated 9 years ago
- A List of Foundational JavaScript Tools☆26Apr 4, 2014Updated 12 years ago
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 4 years ago