Codes for malware, viruses and key-logger and other tools
☆37Aug 14, 2021Updated 4 years ago
Alternatives and similar repositories for Ethical-Hacking
Users that are interested in Ethical-Hacking are comparing it to the libraries listed below
Sorting:
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆16Dec 6, 2024Updated last year
- what the fuck is this shit☆25Dec 14, 2015Updated 10 years ago
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆22Aug 2, 2025Updated 7 months ago
- ☆31Feb 15, 2016Updated 10 years ago
- Source Code for 'Beginning Ethical Hacking with Kali Linux' by Sanjib Sinha☆30Dec 3, 2018Updated 7 years ago
- AI Powered Terminal Based Ethical Hacking Assistant☆89Feb 3, 2025Updated last year
- ChatGPT for Ethical Hackers, by EC-Council☆48Mar 18, 2025Updated 11 months ago
- ☆10May 17, 2025Updated 9 months ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆93Apr 27, 2025Updated 10 months ago
- A flexible and portable solution that uses a single robust prompt and customized hyperparameters to classify user messages as either mali…☆16Aug 8, 2025Updated 6 months ago
- MIDI Controller over USB for Thetis, PowerSDR and etc.☆10Apr 16, 2023Updated 2 years ago
- “Replace your politicians with code.” — Home of the Popularis Direct Democracy Whitepaper.☆11Oct 31, 2022Updated 3 years ago
- Rust ChatGPT CLI is a user-friendly terminal interface for OpenAI's GPT chatbot. Start conversations, manage ongoing chats, and send text…☆11May 9, 2023Updated 2 years ago
- Integrating Symbolic Programming and Neuromorphic Modeling for Edge Labs with NVIDIA Jetson, DGX Spark, and GPU-based DNN/ML Systems☆15Feb 24, 2026Updated last week
- Development Environment Setup For Android using Termux☆13Jul 18, 2022Updated 3 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- tiktok bot tiktok botting 🔥 tiktok follower 🔥 tiktok likes 🔥 tiktok views tiktok automater tiktok aio quiwaklrc☆24Jun 21, 2025Updated 8 months ago
- DDRS4PALS - A software for the acquisition and simulation of positron lifetime spectra (PALS) using the DRS4 evaluation board.☆12Aug 29, 2022Updated 3 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- ☆10Jan 18, 2023Updated 3 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- Second version of an AI to predict horse racing winner☆10Feb 11, 2020Updated 6 years ago
- Initial implementation utilising AARNN principles☆10Feb 27, 2023Updated 3 years ago
- ☆14May 14, 2022Updated 3 years ago
- TikTok Mass Report Tool Automated reporting for accounts and videos with proxy & multi-account support☆17Feb 14, 2026Updated 2 weeks ago
- This repository is a collection of notes, links, tutorials, and experiences aimed at helping others. If you find it useful, please consid…☆19Jun 24, 2025Updated 8 months ago
- Convert Bat to exe☆10Aug 25, 2020Updated 5 years ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- A fault tolerant version of the T03x core, using triple redundancy approach to ensure fault tolrance☆16Aug 24, 2024Updated last year
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54May 12, 2025Updated 9 months ago
- best tool for hacking via windows cmd☆13Jan 4, 2019Updated 7 years ago
- This open-source project tracks RED-LILI's activity over time as there are evidence the actor is still active. All information provided h…☆11Jun 23, 2023Updated 2 years ago
- Neuromorphic ASIC with 96 neurons on Tiny Tapeout 7☆11May 25, 2024Updated last year
- Flat Shade Society - Solskogen 2019 invite☆10Oct 2, 2019Updated 6 years ago
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- Read and write AES-256 encrypted files to an NFC implant (xSIID)☆13Jan 19, 2024Updated 2 years ago