swoops / video-game-save-file-trojansLinks
Demonstrates why it's not safe to download random save files from the Internet
☆18Updated 3 years ago
Alternatives and similar repositories for video-game-save-file-trojans
Users that are interested in video-game-save-file-trojans are comparing it to the libraries listed below
Sorting:
- details about DIAL protocol vulnerabilities☆29Updated 2 years ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Updated last year
- Custom Binary Ninja Themes☆12Updated 2 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- Still point in moving world.☆49Updated 3 years ago
- Legba recipes.☆51Updated last year
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆10Updated last year
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆15Updated 5 months ago
- ☆14Updated 9 months ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Build wordlists from the common-crawl index☆12Updated 3 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- OSINT Platform - Provides image analysis, digital footprints, video transcription and more. Retrieval Augmented Generation (RAG) capable …☆11Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆15Updated last year
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Slides and videos from talks given at cons☆25Updated 6 months ago
- 📧 [Research] E-Mail Injection: Vulnerable applications☆18Updated last year
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 2 years ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆31Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17Updated 4 years ago