My dotfiles for Windows boxes
☆29Feb 22, 2026Updated last month
Alternatives and similar repositories for dotfiles-windows
Users that are interested in dotfiles-windows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My dotfiles for Linux boxes☆57Feb 20, 2026Updated last month
- Windows Network File System Remote exploit for CVE-2022-30136☆14Jul 11, 2023Updated 2 years ago
- File compression library | Shennon | Fano | Huffman | Bigram Huffman | Adaptive Huffman | Arithmetic coding☆13May 10, 2020Updated 5 years ago
- ☆28Updated this week
- ☆26Jul 17, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Run multiple PowerShell scripts concurrently in different app domains!☆35Dec 24, 2015Updated 10 years ago
- ✨ Open-source AI hackers for your apps 👨🏻💻☆34Sep 9, 2025Updated 6 months ago
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- Windows Persistence Toolkit in C#☆36Sep 23, 2022Updated 3 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- ☆15Feb 5, 2025Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Oct 18, 2024Updated last year
- ☆41Oct 20, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- Chocolatey 'docker' package☆12Jan 21, 2019Updated 7 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- Open source tool that uses censys and shodan for passive recon.☆13May 20, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 8 months ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Convert internet traffic to music.☆23Feb 22, 2014Updated 12 years ago
- SPAMer work☆10Oct 18, 2019Updated 6 years ago
- ☆10Apr 13, 2021Updated 4 years ago
- ☆13Oct 21, 2023Updated 2 years ago
- This is a webshell open source project☆10Oct 7, 2016Updated 9 years ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last month
- ☆20Jan 12, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Word counting made easy. Retrieve the number of words in a string or stdin.☆10Jan 5, 2023Updated 3 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- PoC of the Hundred Finance March 2022 exploit☆10Nov 10, 2022Updated 3 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- show which process did what DNS queries☆36Jan 25, 2018Updated 8 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago