El-Castor's Stars
sqlalchemy/sqlalchemy
The Database Toolkit for Python
mukulpatnaik/researchgpt
A LLM based research assistant that allows you to have a conversation with a research paper
freqtrade/freqtrade-strategies
Free trading strategies for Freqtrade bot
ShadowCorpIndustries/SpotLight
THIS PROJECT HAS BEEN DELETED
OWASP/QRLJacking
QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login with QR code” feature as a secure way to login into accounts which aims for hijacking users session by attackers.
adonespitogo/AdoBot
Open-source android spyware
freqtrade/frequi
Freqtrade UI - Frontend for Freqtrade
noob-hackers/seeu
SeeU is a camera hacking tool which is used to hack selfie camera of devices....
umeshshinde19/instainsane
Multi-threaded Instagram Brute Forcer (100 attemps at once)
UndeadSec/SocialFishMobile
:iphone: :fish: An app to remote control SocialFish.
Tsuyoken/ImgBackdoor
Hide your payload into .jpg file
ranaaditya/SPYZIER-APP
Android spying app and Parental controller app.
thatcherclough/BetterBackdoor
A backdoor with a multitude of features.
UndeadSec/Idisagree
Control remote computers using discord bot and python 3.
GaudiLabs/PocketPCR
Pocket size USB powered PCR Thermo Cycler
Matrix07ksa/EvilNet
Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../
permikomnaskaltara/instainsane
Multi-threaded Instagram Brute Forcer (100 attemps at once)
Lucksi/Interceptor
An Ip-Grabber Tool With a Custom Redirect Link
KURO-CODE/Skeleton
Skeleton is a Social Engineering tool attack switcher
FZGbzuw412/SATANKLGR
⛤Keylogger Generator for Windows written in Python⛤
MBHudson/Vigilante-Toolset
!!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most tools to work as normal while resolving .onion
Tsuyoken/MSBackdoor
[Discontinued] Transform your payload into fake powerpoint (.ppt)
gsuareztangil/cryptomining-malware
Resources for our (extended) version of our IMC Crypto-Mining Malware paper
Maggi-Chen/Inspector
A tool for evaluating long-read de novo assembly results
CyberWarefare/Overview
Cyber Warfare is a free and open source international intrusion detection and prevention advisory
christoftorres/Crypto-Mining-Malware
An analysis on cryptocurrency mining malware embedded via JavaScript.
Hacking-y-Pentest/seeker-by-thewhite4t
DrDaveThomas/Rapid-Tome-3D-Print-Files
This repository contains all 3D print files of the file type .stl needed to construct the hand-held microtome, the Rapid-Tome. These files are associated with a BioRxiv preprint with assembly instructions found here: https://doi.org/10.1101/2022.10.28.513790 Files are made available under a CC-BY-NC 4.0 international license.
bhamla-lab/OpenCell
umeshshinde19/blackeye-1
The ultimate phishing tool with 38 websites available!