An automated script to extract hidden images from Tecno Camon X
☆12Sep 23, 2023Updated 2 years ago
Alternatives and similar repositories for gallery3d-tecno-exploit
Users that are interested in gallery3d-tecno-exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Mar 8, 2024Updated 2 years ago
- This is IPFS web3.storage unofficial library written in python. I have made it simple and easier to integrate with web3.storage API using…☆14Oct 27, 2023Updated 2 years ago
- A community package-based python wrapper that simplifies carrying out scans, and pentests upon certain scope while performing security pe…☆11Dec 10, 2023Updated 2 years ago
- Send an SMS from GitHub Actions using Africastalking Programmable SMS☆12Mar 26, 2023Updated 2 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- A Figma plugin to help generate hues, tints, and/or shades☆20Jun 7, 2023Updated 2 years ago
- Web page to tell you power status of various location in Dar es salaam☆24Mar 11, 2024Updated 2 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- A curation of awesome security tools, exploits security projects developed by Tanzanian Cybersecurity Enthusiasts☆13Apr 14, 2024Updated last year
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆18Mar 13, 2024Updated 2 years ago
- cyber security notes for your consumption.☆14Jul 30, 2024Updated last year
- API for Tanzania NBC Premium League☆24Feb 26, 2023Updated 3 years ago
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- Using Python to blur faces in images and videos, ensuring quality is maintained. Aimed at protecting online privacy.☆10Jan 8, 2024Updated 2 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- ☆19Jan 16, 2026Updated 2 months ago
- RCE PoC for Empire C2 framework <5.9.3☆28Feb 24, 2024Updated 2 years ago
- ☆25Jul 7, 2023Updated 2 years ago
- Explore CVE 2023-30845 automatically across multiple subdomains☆16Sep 30, 2023Updated 2 years ago
- Laravel Azampay☆30Mar 16, 2026Updated last week
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- This document contains a list of tools and platforms that allow for GEOINT analysis focused on Colombia.☆19Oct 8, 2024Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆77Oct 6, 2023Updated 2 years ago
- ☆41Oct 20, 2023Updated 2 years ago
- Sarufi NodeJs SDK to help you interact with Sarufi Conversational API☆10Jul 12, 2023Updated 2 years ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- uwu☆21Aug 19, 2024Updated last year
- A piece of code to send an SMS to your mobile phone using the Free SMS API service.☆15Nov 19, 2016Updated 9 years ago
- Web-app of a Thesis management system☆17Jan 7, 2023Updated 3 years ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- Este proyecto implementa un poderoso túnel SSH totalmente anónimo utilizando la red Tor y múltiples proxies intermedios. Permite enrutar …☆13Aug 17, 2023Updated 2 years ago
- Fetch information about a public Google document.☆13Aug 4, 2023Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated last year
- ☆24Nov 3, 2022Updated 3 years ago
- Unofficial Kotlin Multiplatform NIDA API☆15Dec 27, 2025Updated 2 months ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago
- 🔒 A curated checklist of 100+ tips for protecting digital security and privacy in 2020☆26Sep 17, 2023Updated 2 years ago
- A curation of awesome tools and projects built by Tanzanian developers.☆77Jan 29, 2025Updated last year