Music video streaming web application with Spring Boot, Hibernate, Redis, PostgreSQL, React and Redux.
☆22Mar 20, 2022Updated 4 years ago
Alternatives and similar repositories for spookify
Users that are interested in spookify are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AWS CLI -eq PowerShell☆15Updated this week
- Simple, serverless client for AWS SES. With this, you can send/read emails received by SES into S3 without purchasing AWS Workmail. If yo…☆26Nov 18, 2021Updated 4 years ago
- Publish AWS News to Twitter☆35Nov 23, 2023Updated 2 years ago
- Fullstack bulletproof MERN sample project. Monorepo included!☆18Apr 8, 2021Updated 4 years ago
- Vendored copy of the AWS LandingZone solution using CloudFormation. Look at each tag to see the current landing-zone. Use git-diff to sho…☆25Feb 27, 2024Updated 2 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- This extension provides a way to discover NoSQL injection vulnerabilities.☆10Feb 1, 2021Updated 5 years ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- Multi-threading wget golang☆13Mar 13, 2024Updated 2 years ago
- A collection of utility scripts and other tools that make working with Crabgrass easier.☆11Apr 3, 2020Updated 5 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- Code for the "Hiding Data In Sound" video☆12Jan 19, 2023Updated 3 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 4 years ago
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago
- simple c2 written in python to demonstrate security concepts☆13Sep 17, 2018Updated 7 years ago
- CVE-2020-36109 PoC causing DoS☆17Apr 20, 2022Updated 3 years ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆11Jul 15, 2022Updated 3 years ago
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Sep 27, 2022Updated 3 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- A tool to embed files into images☆14Feb 10, 2021Updated 5 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated 10 months ago
- A simple injector that uses LoadLibraryA☆18Jun 14, 2020Updated 5 years ago
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Jun 29, 2025Updated 8 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 3 years ago
- ☆15Dec 12, 2023Updated 2 years ago
- Free Advance encryptor for Anon Cloud☆16Jan 26, 2023Updated 3 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- Zabbix WebHook GLPI☆12Aug 7, 2023Updated 2 years ago
- Yee ennoy☆12Nov 21, 2023Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- ☆17Jun 14, 2023Updated 2 years ago
- Independant repo to my fork of exploitdb☆24Sep 22, 2020Updated 5 years ago
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Jun 15, 2023Updated 2 years ago