☆85Aug 22, 2023Updated 2 years ago
Alternatives and similar repositories for vpnleaks
Users that are interested in vpnleaks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool to retrieve Config from Redline C2 servers☆16Mar 14, 2023Updated 3 years ago
- ☆11Jul 15, 2024Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆40Aug 30, 2022Updated 3 years ago
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 10 months ago
- Forensic Dropbox☆22Jul 2, 2012Updated 13 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year
- Check All APK's -- scripts for checking your phone for malware☆30Aug 8, 2017Updated 8 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Sep 30, 2022Updated 3 years ago
- Dynamic netflow graphs for nfdump☆14Sep 3, 2015Updated 10 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- ☆16May 6, 2015Updated 10 years ago
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- "Never worry about private methods ever again!"☆25Jul 20, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Discord modding is dead.☆23Sep 27, 2022Updated 3 years ago
- wordpress batch brute force☆11Sep 21, 2021Updated 4 years ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆97Aug 27, 2023Updated 2 years ago
- A simple backdoor for servers and embedded systems.☆14Oct 1, 2025Updated 6 months ago
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Nov 27, 2025Updated 4 months ago
- Exploits Unauth Docker API☆43Apr 18, 2025Updated 11 months ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- quASAR: ASAR manipulation made easy☆38Sep 7, 2022Updated 3 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CVE-2019-0230 Exploit POC☆15Aug 21, 2020Updated 5 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands.☆42Apr 25, 2024Updated last year
- Here is useful scripts collections. You can forge tickets locally with secret keys or certificates. It's useful when you want backdoor/pe…☆20Apr 6, 2024Updated 2 years ago
- PoC for CVE-2016-1000027☆12Mar 5, 2021Updated 5 years ago
- ☆12Apr 14, 2017Updated 9 years ago
- Detect and alert when Rogue AP and Deauth attacks occur☆14May 16, 2019Updated 6 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated 11 months ago
- This repo helps me compete in my Fantasy Football League.☆12Dec 8, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 3 years ago
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- This is my own custom fork of Bhassani's original repo, which contains the (unfinished) reverse-engineered WannaCry Ransomware-related fi…☆10Mar 7, 2023Updated 3 years ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆137May 8, 2024Updated last year
- KeyTrap (DNSSEC)☆44Feb 18, 2024Updated 2 years ago
- ☆17Aug 14, 2024Updated last year
- ☆23Nov 29, 2023Updated 2 years ago