☆318Mar 13, 2025Updated last year
Alternatives and similar repositories for akira-bruteforce
Users that are interested in akira-bruteforce are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆32Oct 7, 2024Updated last year
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Jun 18, 2025Updated 9 months ago
- "MENCEGAH LEBIH BAIK DARIPADA BEROBAT" # 🤖 H4N5VS - Mikrotik System Security **Aplikasi monitoring dan keamanan router Mikrotik** *…☆14May 1, 2025Updated 11 months ago
- Script Auto Read Story WhatsApp Menggunakan Library @whiskeysockets/baileys☆29Nov 17, 2025Updated 4 months ago
- Breaking the MediaNav 4☆21Sep 18, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year
- MikroTik Hotspot Monitor V3 by laksa19 as container image.☆12Dec 5, 2025Updated 4 months ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆88Oct 17, 2024Updated last year
- ☆41Aug 18, 2020Updated 5 years ago
- Whastapp Bot With All In One Tool☆13Nov 1, 2024Updated last year
- Extension to let YouTube run nonstop with autoplay, autoconfirm and automatic pressing the loopbutton.☆16Jan 18, 2026Updated 2 months ago
- TrueMedia.org web application for querying multiple deepfake detection models and analyzing results☆22Jan 24, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Create honeypots for cloud environments☆114Oct 6, 2025Updated 6 months ago
- Tool written in Rust to enumerate the valid email addresses of an Azure/Office 365 Tenant☆15Feb 29, 2024Updated 2 years ago
- Bot creado por el proyecto Cibervengadores, automatiza la recolección de indicadores de compromiso en un repostiroio público de GitHub☆15Jul 4, 2025Updated 9 months ago
- Enables you to disable video streams on youtube and listen audio.☆17May 12, 2020Updated 5 years ago
- Some V8 n-day exploits that I've written☆54Mar 1, 2026Updated last month
- PoC for CVE-2025-48384☆21Jul 9, 2025Updated 9 months ago
- Kumpulan slide presentasi seminar, talk, workshop☆14Nov 11, 2025Updated 4 months ago
- Sharing Knowledge "Hands On Scraping Data dengan kasus Analisis Sentimen pada Kebijakan Pemerintah"☆23May 28, 2025Updated 10 months ago
- ☆31Feb 28, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Keepass SftpSync☆30May 20, 2024Updated last year
- CVE-2023-1671-POC, based on dnslog platform☆17Apr 26, 2023Updated 2 years ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆114Feb 18, 2025Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated last year
- ☆13Oct 20, 2025Updated 5 months ago
- Database alamat lengkap seluruh Indonesia☆10Feb 8, 2020Updated 6 years ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆54Dec 8, 2023Updated 2 years ago
- Tutorial Linux x64 Assembly Bahasa Indonesia☆38May 21, 2024Updated last year
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Foundry-like interface for interacting with the Ethereum application in python with extra features for solving CTF Challenges using the w…☆42Jul 31, 2025Updated 8 months ago
- GAUSS MALWARE Source [Striking similarities with Duqu, FlameR!, Fanny, StuxNet and more.] Source coming soon! + Binaries + Video show…☆18Aug 4, 2022Updated 3 years ago
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated last year
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆39Sep 16, 2025Updated 6 months ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Online-Crawler-Wayback-Machine☆27Oct 15, 2024Updated last year
- Browser extension for launching multi-platform OSINT queries from grouped YAML profiles.☆10Apr 25, 2025Updated 11 months ago