swoops / video-game-save-file-trojansLinks
Demonstrates why it's not safe to download random save files from the Internet
☆17Updated 2 years ago
Alternatives and similar repositories for video-game-save-file-trojans
Users that are interested in video-game-save-file-trojans are comparing it to the libraries listed below
Sorting:
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- A TikTok - Live Watcher application for tty / cli - for the unlikely situation when you live in tty, but want to watch TikTok Live.☆27Updated last year
- details about DIAL protocol vulnerabilities☆30Updated last year
- Legba recipes.☆50Updated last year
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆15Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 8 months ago
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- Slides and videos from talks given at cons☆25Updated 2 months ago
- Minimalistic port-spoofer written in Python☆11Updated 8 months ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- ☆13Updated 2 years ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 5 months ago
- APK Infrastructure Investigator☆64Updated 2 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆15Updated 3 years ago
- A C# Tool to gather information about email breaches☆15Updated last year
- 📧 [Research] E-Mail Injection: Vulnerable applications☆15Updated last year
- A repository preserving darknet market data, including vendor lists, PGP keys, listings, and more for research & intelligence purposes.☆44Updated 2 months ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆50Updated 10 months ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Updated 2 years ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆43Updated 8 months ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- XSerum is a powerful web attack payload generator designed for red teamers, ethical hackers, and researchers. It supports a wide range of…☆21Updated 5 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆51Updated 6 months ago
- Network Traffic Fuzzer☆18Updated 8 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 10 months ago
- Custom Binary Ninja Themes☆12Updated last year
- AWS Testing and Reporting Management Tool☆20Updated 2 years ago