LIPiKs is a modern React dashboard for data analytics and finance, built with Vite, React, Bun, and Tailwind CSS. Monitor your data analytics to increase revenue for BTC, BTB, & SAAS platforms.
☆18Jun 23, 2025Updated 10 months ago
Alternatives and similar repositories for LIPiKs
Users that are interested in LIPiKs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HTB write-ups with detailed walkthroughs, screenshots, and tutorials for ethical hacking, CTF challenges, and penetration testing.☆29Nov 10, 2025Updated 5 months ago
- My collection of hacking books for learning information security☆31Dec 25, 2022Updated 3 years ago
- Every GitHub repo mentioning OSCP — hunted, cloned, read by AI, judged by a human. 399 clean repos.☆78Mar 5, 2026Updated last month
- Kernel-space x86_64 Linux rootkit leveraging kprobes and ftrace for syscall hooking (hiding entries and reverse shell backdoor)☆25Nov 20, 2025Updated 5 months ago
- Things i do because i saw it on twitter on a weekend☆58Jul 20, 2025Updated 9 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools☆59Apr 22, 2026Updated last week
- SafeCity App allows users to report crimes and other incidents, view crime hotspots and an analysis of crime patterns in areas near them.☆19Aug 29, 2023Updated 2 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34May 16, 2022Updated 3 years ago
- This repository consists of extensions, that hacktron uses to execute specific workflows in CLI.☆100Dec 27, 2025Updated 4 months ago
- EFF's 4G IMSI catcher - catcher☆60Aug 14, 2020Updated 5 years ago
- AI 驱动的 SOC 仿真平台☆154Jan 2, 2026Updated 3 months ago
- A Public available archive of the leaked Vault 7 archive files☆71Mar 8, 2017Updated 9 years ago
- CTI Cyber Threat Intelligence OSINT Dark Web Deep Web Research. Ransomware gang information gathering tool.☆150Dec 19, 2025Updated 4 months ago
- Dynamic shellcode loader with sophisticated evasion capabilities☆291Oct 1, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- l2ping with threads to flood attack bluetooth devices☆110Mar 25, 2026Updated last month
- Obex – Blocking unwanted DLLs in user mode☆284Sep 18, 2025Updated 7 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆209Aug 9, 2025Updated 8 months ago
- Devkit for building Metasploit-like consoles☆256Oct 1, 2025Updated 6 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆401Mar 20, 2025Updated last year
- WPair is a defensive security research tool that demonstrates the CVE-2025-36911 (eg WhisperPair) vulnerability in Google's Fast Pair pro…☆766Jan 18, 2026Updated 3 months ago
- ☆376Sep 1, 2021Updated 4 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆449Apr 11, 2025Updated last year
- ☆407Apr 10, 2026Updated 2 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆450May 24, 2025Updated 11 months ago
- A list of OSINT tools & resources for (fraud-)investigators, CTI-analysts, KYC, AML and more.☆740Apr 17, 2026Updated last week
- Simulate the behavior of AV/EDR for malware development training.☆567Feb 15, 2024Updated 2 years ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆762Jan 26, 2025Updated last year
- Multimodal Chain-of-Thought Reasoning: A Comprehensive Survey☆981Nov 14, 2025Updated 5 months ago
- ☆1,021Jan 23, 2023Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,473Aug 18, 2023Updated 2 years ago
- A web app for modular conversion, encoding, and encryption, all performed directly in your browser with no server interaction☆1,485Oct 27, 2024Updated last year
- BlackLotus UEFI Windows Bootkit☆2,204Mar 28, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,109May 27, 2022Updated 3 years ago
- DeepAudit:人人拥有的 AI 黑客战队,让漏洞挖掘触手可及。国内首个开源的代码漏洞挖掘多智能体系统。小白一键部署运行,自主协作审计 + 自动化沙箱 PoC 验证。支持 Ollama 私有部署 ,一键生成报告。支持中转站。让安全不再昂贵,让审计不再复杂。☆5,845Apr 1, 2026Updated 3 weeks ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,735Sep 23, 2025Updated 7 months ago
- Hyperlight is a lightweight Virtual Machine Manager (VMM) designed to be embedded within applications. It enables safe execution of untru…☆4,234Updated this week
- Cybersecurity AI (CAI), the framework for AI Security☆8,262Apr 20, 2026Updated last week
- Reverse Engineering: Decompiling Binary Code with Large Language Models☆6,559Feb 12, 2026Updated 2 months ago
- ‼️ No waybar here ‼️☆9,120Updated this week