This is a demo Project of a sample of a pokedex, on this sample, you have: *Backend: Where you create your pokemons, upload their images and set the locations of it. *Api: where you send information to who need it. *Xamarin Project: where you consume the pokemon list, you can mark as favorite somes, and see the map where that pokemon was found …
☆72Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for PocketDex
Users that are interested in PocketDex are comparing it to the libraries listed below
Sorting:
- ☆10Apr 20, 2022Updated 3 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- How to create an OS from scratch☆12Jan 22, 2020Updated 6 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆19Mar 20, 2025Updated 11 months ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- ☆11Oct 30, 2024Updated last year
- nacos 任意文件读写☆11Aug 29, 2024Updated last year
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Aug 26, 2022Updated 3 years ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆20Mar 22, 2025Updated 11 months ago
- Tools for multilanguage & Markdown multilang☆11Apr 21, 2024Updated last year
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.☆20Mar 13, 2024Updated last year
- Fully Automated Nim Packages Security Audit☆11Mar 1, 2026Updated last week
- Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.☆11Feb 3, 2024Updated 2 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- bash script to automate wardriving tasks. (Wi-Fi & Bluetooth)☆11Feb 14, 2023Updated 3 years ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated 11 months ago
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆18Mar 19, 2025Updated 11 months ago
- Simple Chatbot for testing AI Red Team tooling☆17Feb 11, 2025Updated last year
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 8 months ago
- ☆12Feb 19, 2026Updated 2 weeks ago
- A proof‑of‑concept C2 framework that uses Server‑Sent Events (SSE) and the MCP protocol for agent registration, command dispatch, and res…☆32Apr 28, 2025Updated 10 months ago
- Nitko web server scanner☆15Sep 25, 2019Updated 6 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Updated this week
- Recursive Credit Card Searcher For Windows C++ and Linux☆14Jan 10, 2020Updated 6 years ago
- My public talks☆14Oct 1, 2024Updated last year
- ZAP Website☆20Updated this week
- Scripts to demonstrate VPC Service Controls between tenant and shared projects☆12Jun 11, 2019Updated 6 years ago
- ☆17Feb 6, 2025Updated last year
- A small collection of AWS utilities, packaged as a single standalone binary.☆13Aug 23, 2023Updated 2 years ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆17Apr 11, 2022Updated 3 years ago
- Config and Secret management across multiple implementations in a uniform way. Inc. AWS SecretsManager/ParameterStore, GCP Secrets, Azure…☆22Mar 2, 2026Updated last week
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Feb 27, 2017Updated 9 years ago
- A GitHub Action that scans your public web applications for log4j vulnerabilities after every deployment. Add this to your dev, staging a…☆14Apr 9, 2022Updated 3 years ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Aug 24, 2022Updated 3 years ago