Make smart phone go through socks proxy, by serving pac
☆27Dec 2, 2018Updated 7 years ago
Alternatives and similar repositories for proxyMyPhone
Users that are interested in proxyMyPhone are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 5 years ago
- ☆13Dec 7, 2023Updated 2 years ago
- Heroes of newerth scripting pack☆19Jan 21, 2023Updated 3 years ago
- A repository full of malware samples.☆13Nov 29, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- IDA Pro plugin manager☆22Jan 23, 2023Updated 3 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆48Jul 24, 2021Updated 4 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- Misc llvm patches☆23Jul 17, 2021Updated 4 years ago
- Shell scripts to make Android development a bit easier☆16May 30, 2019Updated 6 years ago
- A Android program help you learn English.☆14Mar 18, 2024Updated 2 years ago
- Text-to-Speech Synthesis by Generating Spectrograms using Generative Adversarial Network☆10Dec 12, 2018Updated 7 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- A collection of small corpuses of interesting data for the creation of bots and similar stuff.☆10Sep 26, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆11Jun 22, 2020Updated 5 years ago
- A tool for harvesting sysadmin credentials in Linux☆20Jul 10, 2024Updated last year
- Automated Mass Exploiter☆11Apr 14, 2019Updated 7 years ago
- 3DS Theme Editor☆13Jan 24, 2015Updated 11 years ago
- Stack Overflow Command Line☆22Apr 2, 2012Updated 14 years ago
- ☆48Jan 26, 2022Updated 4 years ago
- Library for reading IDA Pro databases.☆29May 1, 2021Updated 5 years ago
- simple script to pwn android phone with physical access☆27Dec 22, 2018Updated 7 years ago
- ☆12Sep 27, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- generate a RSS feed from Twitter or Mastodon search☆14Jan 13, 2024Updated 2 years ago
- Automatic renaming of Objective-C method stubs in Hopper.☆26Jul 8, 2024Updated last year
- Console program to set color for Razer Devices☆13Jan 2, 2019Updated 7 years ago
- Spam call (panggilan) untuk mengerjai teman☆22Jul 18, 2022Updated 3 years ago
- ☆13Oct 14, 2018Updated 7 years ago
- Ambulance!☆12Nov 13, 2015Updated 10 years ago
- An OSINT tool to find data leaks on a targeted website☆17Mar 30, 2021Updated 5 years ago
- Automatic Drum Beat Generator using LSTM☆14Jan 12, 2021Updated 5 years ago
- CVE-2017-11882 File Generator PoC☆35Nov 22, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Clickjacking PoC Generator☆35Oct 1, 2020Updated 5 years ago
- deobfuscation ollvm's fla☆67Mar 22, 2018Updated 8 years ago
- loader to switch from aarch32 to aarch64 and boot☆12Jul 4, 2017Updated 8 years ago
- pYIN pitch detection implementation with librosa and python 3☆14Jul 16, 2019Updated 6 years ago
- PHP library for interacting with the ManiaPlanet Dedicated Server XML-RPC API☆15Aug 19, 2024Updated last year
- runtime spy elf with android/linux and macho with macOS/IOS☆36Mar 31, 2017Updated 9 years ago
- Facebook phisher to get password and email of victim.☆30Mar 13, 2018Updated 8 years ago