☆10Aug 13, 2018Updated 7 years ago
Alternatives and similar repositories for notes
Users that are interested in notes are comparing it to the libraries listed below
Sorting:
- ☆14Sep 23, 2023Updated 2 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆72Mar 13, 2018Updated 8 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 7 years ago
- pinata-csrf-tool☆13Dec 20, 2019Updated 6 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Some stuff for CTF.☆10Oct 27, 2019Updated 6 years ago
- Setup for hashcat on AWS using CloudFormation☆15Mar 20, 2022Updated 4 years ago
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Oct 23, 2021Updated 4 years ago
- Mobile Device Management for Android☆53Apr 2, 2021Updated 4 years ago
- Setup Tor service with Firefox Proxy Settings☆12Mar 20, 2024Updated 2 years ago
- Mig/cctools for Linux combo makefile thingy☆32Jun 7, 2016Updated 9 years ago
- Chrome Crusader☆24Jun 19, 2019Updated 6 years ago
- ☆13Jul 26, 2025Updated 7 months ago
- Welcome! This repo is a conglomeration of tips, tricks, tools, and data analysis to use while doing web application security assessments,…☆14Jan 13, 2019Updated 7 years ago
- Windows Product Key☆11Mar 27, 2023Updated 2 years ago
- Crack php rand() state☆13May 7, 2018Updated 7 years ago
- Exports hackpads☆15Jun 5, 2014Updated 11 years ago
- automating the zig release process☆11Nov 19, 2025Updated 4 months ago
- ☆12Jul 17, 2012Updated 13 years ago
- Arduino french azerty keyboard library☆13May 6, 2021Updated 4 years ago
- This is a plugin for the c# R.A.T Server providing extension to javascript based browser botnets☆24Mar 2, 2018Updated 8 years ago
- CVE-2016-3141☆15Apr 23, 2016Updated 9 years ago
- ☆12Oct 10, 2023Updated 2 years ago
- A fileless Windows keylogger that exfils via DNS.☆32Apr 21, 2017Updated 8 years ago
- https://codeberg.org/ccxvii/djvudec☆14Aug 13, 2025Updated 7 months ago
- Windows GPU rootkit PoC by Team Jellyfish☆37May 9, 2015Updated 10 years ago
- A command line tic-tac-toe game in Golang☆12Oct 14, 2024Updated last year
- Self destructing messages.☆16Mar 18, 2016Updated 10 years ago
- Write ups☆16Dec 13, 2017Updated 8 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆41Jan 10, 2017Updated 9 years ago
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- A library to facilitate the exploitation of padding oracle attacks☆15Apr 1, 2015Updated 10 years ago
- eda-3 from many years ago☆14Sep 5, 2014Updated 11 years ago
- Pure PHP implementation of ChaCha20☆18Feb 26, 2021Updated 5 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- The 2016 Crypto and Privacy Village Blinkybadge☆12Sep 7, 2016Updated 9 years ago
- Solutions to Problems from the Hackerrank Math 🧮 Domain.☆13Aug 4, 2022Updated 3 years ago