A Simple RedLineStealer
☆13Aug 30, 2023Updated 2 years ago
Alternatives and similar repositories for Merlot
Users that are interested in Merlot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆25Sep 22, 2021Updated 4 years ago
- XSS Worm which steals victim's cookies and some information also spread others. Written in js, php and java.☆10Dec 12, 2017Updated 8 years ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆12Jan 23, 2020Updated 6 years ago
- Consulta jurisprudencial do STF☆15Oct 21, 2025Updated 5 months ago
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 2 years ago
- Bases de dados úteis para a ABJ☆20Apr 25, 2023Updated 2 years ago
- ☆11Jun 4, 2025Updated 10 months ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- ☆11Jun 22, 2020Updated 5 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A scraper that downloads DJEs☆22Feb 19, 2019Updated 7 years ago
- Simple AWS ELB log parser which parses Classic LB and ALB logs into JSONs☆18May 2, 2025Updated 11 months ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆20Mar 24, 2025Updated last year
- Tools for attacking various MIFARE RFID cards☆17Jun 21, 2019Updated 6 years ago
- The real GPT-4 with image access (You probably don't have access)☆12Mar 17, 2023Updated 3 years ago
- pArAnoIA - Tiny "Secure" Browser☆13Nov 2, 2024Updated last year
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 6 months ago
- Script to Send Multiple Messages from WhatsApp☆11May 18, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Web app built to allow digital forensic professionals to search for the forensic tools that will parse artifacts from various apps.☆18Apr 30, 2025Updated 11 months ago
- 😈 HTTP/HTTPS python proxy server for man-in-the-middle attack 😈☆19Dec 29, 2019Updated 6 years ago
- Mozilla Firefox Tweaks. Use at your own risk and fun.☆16Nov 27, 2023Updated 2 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆18Oct 25, 2015Updated 10 years ago
- Trying to be the best tool to search for exploits in the terminal.☆12Jul 3, 2017Updated 8 years ago
- Baixa e organiza decisões do Superior Tribunal de Justiça☆21Apr 11, 2025Updated last year
- Example Telegram bot☆10Oct 2, 2023Updated 2 years ago
- ☆11Feb 28, 2020Updated 6 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Aug 26, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- Scraper do CNC-CNJ☆19Feb 9, 2024Updated 2 years ago
- The big-tool is for installing all hacking and security tools !☆10Jul 4, 2021Updated 4 years ago
- Platform for a noob hacker to learn hacking on localhost.☆11Oct 14, 2016Updated 9 years ago
- Several script and images used with the juice jacking kiosks☆12Jul 21, 2013Updated 12 years ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆16Jun 5, 2021Updated 4 years ago