A Simple RedLineStealer
☆13Aug 30, 2023Updated 2 years ago
Alternatives and similar repositories for Merlot
Users that are interested in Merlot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 6 years ago
- Python source random obfuscation☆11Sep 9, 2022Updated 3 years ago
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- ☆12Nov 26, 2021Updated 4 years ago
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- RedLine stealer Source Code (Decompiled)☆74Mar 3, 2020Updated 6 years ago
- ☆12Jan 23, 2020Updated 6 years ago
- A simple chess made specially for termux☆12Dec 15, 2020Updated 5 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆14May 11, 2023Updated 2 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Apr 1, 2026Updated last month
- Consulta jurisprudencial do STF☆16Oct 21, 2025Updated 6 months ago
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆17May 17, 2016Updated 9 years ago
- Bases de dados úteis para a ABJ☆20Apr 25, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆12Jun 4, 2025Updated 10 months ago
- General Purpose Tools for Jurimetrics.☆17Aug 23, 2024Updated last year
- ☆11Jun 22, 2020Updated 5 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- A scraper that downloads DJEs☆22Feb 19, 2019Updated 7 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- Pdfencrypt is a tool to encrypt/lock PDFs☆10Oct 23, 2021Updated 4 years ago
- Tools for attacking various MIFARE RFID cards☆17Jun 21, 2019Updated 6 years ago
- The real GPT-4 with image access (You probably don't have access)☆12Mar 17, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The purpose of this repository is to provide a collaboration space for working on Petya/NoPetya tools specific to ICS☆18Jun 30, 2017Updated 8 years ago
- pArAnoIA - Tiny "Secure" Browser☆13Nov 2, 2024Updated last year
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 7 months ago
- Zip brute is a python script that cracks zip that are password protected using a wordlist dictionary.☆23Jun 14, 2021Updated 4 years ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Jul 2, 2025Updated 9 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Jun 14, 2023Updated 2 years ago
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- Web app built to allow digital forensic professionals to search for the forensic tools that will parse artifacts from various apps.☆18Apr 30, 2025Updated last year
- Mozilla Firefox Tweaks. Use at your own risk and fun.☆16Nov 27, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Series of scripts to generate fake logs for use in cyber exercises.☆18Oct 25, 2015Updated 10 years ago
- Trying to be the best tool to search for exploits in the terminal.☆12Jul 3, 2017Updated 8 years ago
- Baixa e organiza decisões do Superior Tribunal de Justiça☆22Apr 11, 2025Updated last year
- Trillium's - Master the art Of Necessary cybersecurity skills (T-MON)☆14Mar 27, 2024Updated 2 years ago
- ☆11Feb 28, 2020Updated 6 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Aug 26, 2018Updated 7 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago