☆10Aug 13, 2018Updated 7 years ago
Alternatives and similar repositories for notes
Users that are interested in notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Sep 23, 2023Updated 2 years ago
- Collection of tools written in vb6 - ProcessKiller, DriveManager, USBManager, LocalRDP, HTTPServer☆22Jul 2, 2017Updated 8 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆71Mar 13, 2018Updated 8 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 8 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Some stuff for CTF.☆10Oct 27, 2019Updated 6 years ago
- ☆24Nov 11, 2025Updated 5 months ago
- Patched version of s-rah/OnionScan. OnionScan is a free and open source tool for investigating the Dark Web.☆11Jan 23, 2022Updated 4 years ago
- ☆29May 14, 2019Updated 6 years ago
- Python wrapper extension for C Whirlpool digest reference implementation.☆20Dec 30, 2023Updated 2 years ago
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Oct 23, 2021Updated 4 years ago
- Mobile Device Management for Android☆53Apr 2, 2021Updated 5 years ago
- Mig/cctools for Linux combo makefile thingy☆31Jun 7, 2016Updated 9 years ago
- Chrome Crusader☆24Jun 19, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆13Mar 21, 2026Updated last month
- Exports hackpads☆15Jun 5, 2014Updated 11 years ago
- ☆12Jul 17, 2012Updated 13 years ago
- This is a plugin for the c# R.A.T Server providing extension to javascript based browser botnets☆24Mar 2, 2018Updated 8 years ago
- A fileless Windows keylogger that exfils via DNS.☆31Apr 21, 2017Updated 9 years ago
- ☆15Jan 15, 2015Updated 11 years ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Apr 9, 2026Updated 3 weeks ago
- Windows GPU rootkit PoC by Team Jellyfish☆37May 9, 2015Updated 10 years ago
- ☆12May 13, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Self destructing messages.☆16Mar 18, 2016Updated 10 years ago
- Write ups☆16Dec 13, 2017Updated 8 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆41Jan 10, 2017Updated 9 years ago
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- A library to facilitate the exploitation of padding oracle attacks☆15Apr 1, 2015Updated 11 years ago
- eda-3 from many years ago☆14Sep 5, 2014Updated 11 years ago
- ☆17Aug 19, 2024Updated last year
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆12Apr 5, 2025Updated last year
- ☆16Mar 26, 2017Updated 9 years ago
- The 2016 Crypto and Privacy Village Blinkybadge☆12Sep 7, 2016Updated 9 years ago
- A Prime Number Algorithm by E. W. Dijkstra☆16Jan 12, 2021Updated 5 years ago
- ☆10Mar 31, 2016Updated 10 years ago
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆12May 12, 2022Updated 3 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago