Everything You Need
☆18Oct 3, 2020Updated 5 years ago
Alternatives and similar repositories for resources
Users that are interested in resources are comparing it to the libraries listed below
Sorting:
- A BASH script to automate simple tasks related to static malware analysis☆12Oct 2, 2020Updated 5 years ago
- For Bypass lock Screen On android | Tested On Android : 2..5☆22Jan 31, 2021Updated 5 years ago
- ☆49Oct 28, 2020Updated 5 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- ☆11Jun 10, 2020Updated 5 years ago
- ☆13May 22, 2023Updated 2 years ago
- Bxi crack version☆10Jul 7, 2022Updated 3 years ago
- ☆11Jun 28, 2022Updated 3 years ago
- ☆53Jul 9, 2013Updated 12 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Matrix digital rain in P5.JS & Canvas☆11Sep 22, 2019Updated 6 years ago
- describing the FISMA Ready project and its goals☆12Mar 20, 2019Updated 6 years ago
- Leech Tools (Free Version) provides fraud tools such us Credit Card Generator, Bank Identification Number Lookup and Credit Card Validity…☆11May 9, 2019Updated 6 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- This tool helps #blueteams detect bad actors who may be port scanning the network, and allows #redteams to practice honeypot evasion.☆11Oct 20, 2020Updated 5 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated last year
- Misc stuff from internet☆12Nov 5, 2025Updated 3 months ago
- Kernel source for the Samsung Galaxy S20, S20+, S20 Ultra, Note 20 and Note 20 Ultra (Snapdragon)☆11Dec 18, 2023Updated 2 years ago
- Automating the boring stego work for you..☆13Feb 26, 2019Updated 7 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- Restore iOS devices without updating via rootfilesystem DMG☆10Nov 9, 2018Updated 7 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Weaponize Sailfish OS with Kali linux☆12Jan 15, 2020Updated 6 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 12 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- rtl8821ce Offline Installer for linux.☆12Aug 12, 2019Updated 6 years ago
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- Client side web application build to help Youtubers deal with thousands of comments☆10Apr 29, 2020Updated 5 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- ☆16Oct 31, 2025Updated 4 months ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- ☆11Oct 20, 2018Updated 7 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Discord Bot for Realtime Updates from CTFd☆10Jan 10, 2021Updated 5 years ago