Pinned Repositories
mitiuu's Repositories
mitiuu/Deep-Live-Cam
real time face swap and one-click video deepfake with only a single image (uncensored)
mitiuu/locket
Phát triển một module API để tương tác với các dịch vụ của Locket Camera, bao gồm việc lấy thông tin người dùng, gửi tin nhắn, thay đổi thông tin hồ sơ, và nhiều hơn nữa.
mitiuu/CVE-2024-4577
PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC
mitiuu/IOS-Backup-Tool
mitiuu/dot
The Deepfake Offensive Toolkit
mitiuu/quack-quack-game
mitiuu/odoproxy
Odo Proxy/EagerProxy/OBC PROXY/VinaProxy/GO Proxy/HP Proxy
mitiuu/vixtts-demo
mitiuu/Harmony
A library for patching, replacing and decorating .NET and Mono methods during runtime
mitiuu/MBBank
An unofficial API wrapper for Vietnam Military Commercial Joint Stock Bank (MBBank, MB)
mitiuu/Rope
GUI-focused roop
mitiuu/gglens
mitiuu/telegram-get-remote-ip
Get IP address on other side audio call in Telegram.
mitiuu/CVE-2023-38831-winrar-exploit
CVE-2023-38831 winrar exploit generator
mitiuu/text-generation-webui-colab
A colab gradio web UI for running Large Language Models
mitiuu/Windows_LPE_AFD_CVE-2023-21768
LPE exploit for CVE-2023-21768
mitiuu/KAutoHelper
A library helps to control Phone, Phone simulator by ADB. Control windows process by Handle. Discord server: https://discord.gg/wXGHRTep(IntPtr). Find image in image use OpenCV. Simulate real Keyboard and Mouse.
mitiuu/holoiso
SteamOS 3 (Holo) archiso configuration
mitiuu/Nsp-XCI-Nca-unpack
tuto
mitiuu/truy_chik
mitiuu/gaga
mitiuu/multi_proxy_ipv6
Create multi proxy ipv6 at single ipv4
mitiuu/dnlib
Reads and writes .NET assemblies and modules
mitiuu/UndetectedChromeDriver
mitiuu/hoaxshell
An unconventional Windows reverse shell, currently undetected by Microsoft Defender and various other AV solutions, solely based on http(s) traffic.
mitiuu/xmrig
mitiuu/TON-pow-miner-fpga
mitiuu/HtmlSmuggling
HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page. The malicious script decodes and deploys the payload on the targeted device when the victim opens/clicks the HTML attachment/link. The HTML smuggling technique leverages legitimate HTML5 and JavaS
mitiuu/ngrok
mitiuu/dockerfile_service
service images