☆18Oct 30, 2020Updated 5 years ago
Alternatives and similar repositories for hacking-reading-list
Users that are interested in hacking-reading-list are comparing it to the libraries listed below
Sorting:
- LLM Frontend for Power Users.☆12Feb 7, 2024Updated 2 years ago
- ☆13Oct 22, 2023Updated 2 years ago
- Simple Captive Portal for Evil Crow Keylogger: Access point (Free WiFi) with a registration form. Information is stored on the MicroSD ca…☆13Oct 6, 2020Updated 5 years ago
- COD Mobile - norecoil/spread/speed hack/fly/highview sit/highview☆13Oct 30, 2019Updated 6 years ago
- Large language models (LLMs) made easy, EasyLM is a one stop solution for pre-training, finetuning, evaluating and serving LLMs in JAX/Fl…☆11Apr 26, 2023Updated 2 years ago
- ☆10Oct 24, 2022Updated 3 years ago
- one-click deepfake (face swap)☆10May 30, 2023Updated 2 years ago
- Advanced AI Jailbreak. Uses steganography and fernet encryption to pass data that is hidden in images to AI models undetected.☆11Jan 28, 2024Updated 2 years ago
- Using the "AdGuard DNS" DNS system-lessly! As simple as that and block ads and trackers.☆12Dec 13, 2023Updated 2 years ago
- quick'n dirty hack to invoke ARM SMC instruction from userland through debugfs☆14Sep 4, 2016Updated 9 years ago
- ☆11Jul 29, 2021Updated 4 years ago
- [译] Pandas 中文文档(待校对)☆10Dec 10, 2017Updated 8 years ago
- A customized spectator HUDs for CS2, Eclipse Hud Manager 6☆13Apr 17, 2025Updated 10 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 16, 2020Updated 5 years ago
- Simple netcat-like binary for Windows, created with python and py2exe.☆13Feb 1, 2019Updated 7 years ago
- ElasticSearch vulnerable scanner☆16Oct 6, 2019Updated 6 years ago
- Configuration tool for AMD Overdrive6 devices.☆20Mar 7, 2016Updated 9 years ago
- Resources required for my BiliBili Pwn tutorial☆12Feb 10, 2023Updated 3 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- 一些POC、EXP☆11Nov 4, 2019Updated 6 years ago
- ☆14May 14, 2024Updated last year
- A funny maze game implemented with python3.☆12Feb 4, 2020Updated 6 years ago
- This tool helps you remove ghost followers to boost your instagram engagement!☆17Sep 13, 2023Updated 2 years ago
- Rogue wifi AP with fake captive portal login page for pentesting with ESP32.☆12Jan 8, 2024Updated 2 years ago
- 小伴智能体(代号:ben)是一款可采用数字人、虚拟人、UE、Live2D、具身硬件为形象的智能体AI Agent项目☆18Apr 9, 2024Updated last year
- All the writeups of www.ctfwp.com☆49Dec 3, 2019Updated 6 years ago
- Modified version of Duckuino to convert Ducky Script for use with Devices running ESPloit(Cactus WHID)☆13Oct 11, 2017Updated 8 years ago
- iBooker 老实人报☆16Apr 20, 2023Updated 2 years ago
- ☆11Jan 11, 2026Updated last month
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆12Sep 26, 2016Updated 9 years ago
- ☆10Apr 14, 2025Updated 10 months ago
- ☆48Feb 1, 2022Updated 4 years ago
- ☆16Sep 23, 2025Updated 5 months ago
- 🐶 A curated list of Web Security materials and resources. With repository stars⭐ and forks🍴☆19Updated this week
- A nice tool to get all discord token info☆12Apr 18, 2023Updated 2 years ago
- 自己平时的一些学习笔记;包含 JavaScript、css、http、node、webgis、typescript、react、面试、 等笔记。☆15Aug 22, 2021Updated 4 years ago
- 这是一个JAVA实现的内网穿透程序,TCP内网穿透,用于windows远程桌面,支付开发☆11Jul 7, 2023Updated 2 years ago
- CMS指纹识别☆17Jan 8, 2019Updated 7 years ago
- HTTP协议穷举工具,可穷举用户名、密码、验证码等等。常用于用户名爆破、密码爆破、验证码爆破等类盗号漏洞测试。 编辑☆14Jan 17, 2020Updated 6 years ago