LIPiKs is a modern React dashboard for data analytics and finance, built with Vite, React, Bun, and Tailwind CSS. Monitor your data analytics to increase revenue for BTC, BTB, & SAAS platforms.
☆18Jun 23, 2025Updated 8 months ago
Alternatives and similar repositories for LIPiKs
Users that are interested in LIPiKs are comparing it to the libraries listed below
Sorting:
- HTB write-ups with detailed walkthroughs, screenshots, and tutorials for ethical hacking, CTF challenges, and penetration testing.☆24Nov 10, 2025Updated 4 months ago
- Every GitHub repo mentioning OSCP — hunted, cloned, read by AI, judged by a human. 399 clean repos.☆72Updated this week
- Kernel-space x86_64 Linux rootkit leveraging kprobes and ftrace for syscall hooking (hiding entries and reverse shell backdoor)☆23Nov 20, 2025Updated 3 months ago
- SafeCity App allows users to report crimes and other incidents, view crime hotspots and an analysis of crime patterns in areas near them.☆19Aug 29, 2023Updated 2 years ago
- RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools☆54Updated this week
- Things i do because i saw it on twitter on a weekend☆57Jul 20, 2025Updated 7 months ago
- This repository consists of extensions, that hacktron uses to execute specific workflows in CLI.☆89Dec 27, 2025Updated 2 months ago
- Automated BurpSuite Pro setup for Windows and Linux☆58Nov 20, 2024Updated last year
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34May 16, 2022Updated 3 years ago
- EFF's 4G IMSI catcher - catcher☆57Aug 14, 2020Updated 5 years ago
- CTI Cyber Threat Intelligence OSINT Dark Web Deep Web Research. Ransomware gang information gathering tool.☆137Dec 19, 2025Updated 2 months ago
- A Public available archive of the leaked Vault 7 archive files☆70Mar 8, 2017Updated 9 years ago
- AI 驱动的 SOC 仿真平台☆125Jan 2, 2026Updated 2 months ago
- l2ping with threads to flood attack bluetooth devices☆104Mar 2, 2026Updated last week
- Dynamic shellcode loader with sophisticated evasion capabilities☆286Oct 1, 2025Updated 5 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆197Aug 9, 2025Updated 7 months ago
- Obex – Blocking unwanted DLLs in user mode☆282Sep 18, 2025Updated 5 months ago
- WPair is a defensive security research tool that demonstrates the CVE-2025-36911 (eg WhisperPair) vulnerability in Google's Fast Pair pro…☆701Jan 18, 2026Updated last month
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆396Mar 20, 2025Updated 11 months ago
- ☆368Sep 1, 2021Updated 4 years ago
- A list of OSINT tools & resources for (fraud-)investigators, CTI-analysts, KYC, AML and more.☆708Dec 4, 2025Updated 3 months ago
- ☆384Updated this week
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆448May 24, 2025Updated 9 months ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆443Apr 11, 2025Updated 10 months ago
- Simulate the behavior of AV/EDR for malware development training.☆564Feb 15, 2024Updated 2 years ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆762Jan 26, 2025Updated last year
- Multimodal Chain-of-Thought Reasoning: A Comprehensive Survey☆958Nov 14, 2025Updated 3 months ago
- ☆997Jan 23, 2023Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,470Aug 18, 2023Updated 2 years ago
- A web app for modular conversion, encoding, and encryption, all performed directly in your browser with no server interaction☆1,473Oct 27, 2024Updated last year
- DeepAudit:人人拥有的 AI 黑客战队,让漏洞挖掘触手可及。国内首个开源的代码漏洞挖掘多智能体系统。小白一键部署运行,自主协作审计 + 自动化沙箱 PoC 验证。支持 Ollama 私有部署 ,一键生成报告。支持中转站。让安全不再昂贵,让审计不再复杂。☆5,063Mar 1, 2026Updated last week
- BlackLotus UEFI Windows Bootkit☆2,191Mar 28, 2024Updated last year
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,092May 27, 2022Updated 3 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,714Sep 23, 2025Updated 5 months ago
- Hyperlight is a lightweight Virtual Machine Manager (VMM) designed to be embedded within applications. It enables safe execution of untru…☆4,160Updated this week
- Cybersecurity AI (CAI), the framework for AI Security☆7,349Jan 30, 2026Updated last month
- ‼️ No waybar here ‼️☆7,986Updated this week
- Reverse Engineering: Decompiling Binary Code with Large Language Models☆6,392Feb 12, 2026Updated 3 weeks ago
- Monitor linux processes without root permissions☆5,902Mar 1, 2026Updated last week