Lists (9)
Sort Name ascending (A-Z)
Stars
Go module for working with Keysight/Agilent/HP test equipment.
This is a Golang project structure that I use for my projects. It is based on the hexagonal architecture, with some modifications. The structure is designed to keep the code organized and easy to u…
NoobieDog / IMSI-catcher
Forked from Oros42/IMSI-catcherThis program show you IMSI numbers of cellphones around you.
Android trojan with abilities of recording calls, live mic streaming , remote root commands execution and other
A curated list of awesome pytest resources
A collection of android security related resources
This is an Android Spyware App, Which uploads user data such as Contacts, Messages, Call log & recordings, Send messages, Photos, Videos, etc.
Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).
clymb3r / PowerSploit
Forked from PowerShellMafia/PowerSploitPowerSploit - A PowerShell Post-Exploitation Framework
A little tool to play with Windows security
KeySniffer device discovery tools and public advisories
Clean Architecture - Blazor Web App with .NET 8
Open source IOS keyboard with almost full set of features. (Compared to IOS default keyboard)
macOS keylogger, clipboard monitor, and screenshotter
PounceKey's is a Accessibility Service keylogger for Android 5 to 13! full launcher stealth. choose between receiving logs via IP, Gmail, or Discord. No txt files on device, straight buffer in logc…
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
API samples for the Universal Windows Platform.
PoCs and tools for investigation of Windows process execution techniques
A C#/.NET library to run LLM (🦙LLaMA/LLaVA) on your local device efficiently.
Blazor Component Library based on Material Design principles with an emphasis on ease of use and extensibility
This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.
A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.