☆252Mar 5, 2026Updated last month
Alternatives and similar repositories for ZTW-2025
Users that are interested in ZTW-2025 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Feb 20, 2025Updated last year
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆22May 23, 2024Updated last year
- Script to create custom Evil Portals using the Wifi Pineapple 🍍😈☆15Feb 12, 2023Updated 3 years ago
- The new generation of famous WSO web shell. With perks included☆46Mar 9, 2026Updated last month
- XBot - Advanced AI Cybersecurity Agent | Gemini system prompt for automated penetration testing and security assessments☆68Nov 29, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A sophisticated PowerShell script that stealthily injects Base64-encoded shellcode into the target process, featuring anti-debugging tech…☆24Jun 8, 2024Updated last year
- List of Fresh DNS resolvers updates every 1 hour☆19Updated this week
- ☆16Jun 28, 2025Updated 9 months ago
- ☆43Apr 21, 2025Updated 11 months ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- ☆23Aug 24, 2025Updated 7 months ago
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligen…☆35Jan 4, 2026Updated 3 months ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆14May 8, 2021Updated 4 years ago
- Monitor your targets and hunt fresh assets in real time.☆162Feb 23, 2026Updated last month
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- An alternative privacy-friendly YouTube frontend which is efficient by design.☆27Sep 22, 2022Updated 3 years ago
- Python script implementing the favicon hash trick to find subdomains.☆39Mar 28, 2023Updated 3 years ago
- GDorks Web is a Flask-based web application that allows users to browse and retrieve random Google Dorks from the GDorks repository on Gi…☆12Jul 24, 2025Updated 8 months ago
- ☆25Jan 5, 2026Updated 3 months ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- Bluetooth rubberducky, Keyboard & Mouse Emulator for Kali NetHunter and NetHunter Pro☆15Nov 30, 2025Updated 4 months ago
- Keylogger that sends Email at a specific time☆10Apr 7, 2018Updated 8 years ago
- DPG Campus Tool. Shrink massive PDFs to fit AI upload limits. Sanitize before uploading to reduce risk of exposing sensitive data.☆46Jan 20, 2026Updated 2 months ago
- An OSINT tool to find data leaks on a targeted website☆17Mar 30, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Bringup for the Cisco Meraki MR18 on OpenWRT☆21Dec 21, 2015Updated 10 years ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 8 months ago
- PoC for CVE-2024-42327 / ZBX-25623☆18Dec 3, 2024Updated last year
- Easily send real-time OTP or text SMS from your Android device directly to a Telegram bot with our innovative Android application. Unlike…☆17May 26, 2024Updated last year
- hak5 YouTube videos☆515Aug 9, 2022Updated 3 years ago
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆40Oct 6, 2025Updated 6 months ago
- A tool for inspecting and analyzing mobile application storage files.☆51May 15, 2025Updated 10 months ago
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆17Feb 20, 2026Updated last month
- A fast and efficient subdomain hijacking scanner that checks for takeover vulnerabilities by matching HTTP response bodies against predef…☆29Dec 21, 2025Updated 3 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- Finds internet-exposed resources in an AWS account☆18Sep 1, 2024Updated last year
- Welcome to HEALTHO 🥼🩺 , your virtual healthcare companion powered by AI. This chatbot leverages the potential of artificial intelligenc…☆17Jul 15, 2025Updated 8 months ago
- A python phishing script for login phishing, image phishing, video phishing and many more☆20Mar 13, 2026Updated 3 weeks ago
- Retro Computers - Info and status for all my retro Macs, PCs, gaming systems...☆35Apr 1, 2026Updated last week
- Deploy IRC server using Docker☆13Dec 15, 2023Updated 2 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆44Jan 18, 2026Updated 2 months ago