Bug Bounty Monitor
☆15Nov 23, 2020Updated 5 years ago
Alternatives and similar repositories for Awake
Users that are interested in Awake are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Offensive OSINT☆33Sep 5, 2020Updated 5 years ago
- Scripts related to offensiveosint.io☆23Jun 5, 2020Updated 5 years ago
- From Dork to Download: Automating Google Dorks with Playwright☆40Mar 1, 2026Updated 3 weeks ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- Detect firearm and nudity on Twitter and Instagram☆14Mar 27, 2019Updated 6 years ago
- Track users across social media platform☆165Jan 26, 2021Updated 5 years ago
- Small script for retrieving incoming transactions based on provided hour period.☆14Jan 24, 2022Updated 4 years ago
- Create visualization from Shodan query☆74May 25, 2021Updated 4 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- A HTML representation for decision tree workflow☆12Jun 24, 2020Updated 5 years ago
- Sample projects and demos for TinyCLR OS☆15Apr 9, 2024Updated last year
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Jan 28, 2021Updated 5 years ago
- ☆12Dec 6, 2021Updated 4 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Feb 14, 2018Updated 8 years ago
- simple collection of javascript forms supporting your IOT project☆11Feb 1, 2025Updated last year
- Report and finding templates used by the Serpico reporting tool☆16Sep 26, 2018Updated 7 years ago
- Importer of tile maps from the Tiled editor to the Godot game engine.☆20Oct 23, 2022Updated 3 years ago
- ☆34Jan 22, 2025Updated last year
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 5 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Access radare2 from anywhere, anytime.☆44Updated this week
- docker build nessus with unlimited ip☆13Aug 23, 2021Updated 4 years ago
- List of Custom Search Engines☆34Apr 7, 2020Updated 5 years ago
- Install .NET 7 on a Raspberry Pi with a single line.☆17Jan 2, 2024Updated 2 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated last year
- Grafana Arbitrary File Reading Vulnerability☆27Dec 7, 2021Updated 4 years ago
- 2nd Repo of code samples from our videos!☆23Aug 19, 2025Updated 7 months ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30May 24, 2020Updated 5 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- 寻找可注入进程☆13Jul 16, 2020Updated 5 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.☆19Jun 1, 2021Updated 4 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Use powershell to test Office-based persistence methods☆76Apr 17, 2021Updated 4 years ago
- NClass is a free tool to easily create UML class diagrams with full C# and Java language support. The user interface is designed to be si…☆20Dec 21, 2021Updated 4 years ago