Starred repositories
🏡 Open source home automation that puts local control and privacy first.
The official gpt4free repository | various collection of powerful language models
Clone a voice in 5 seconds to generate arbitrary speech in real-time
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Exploitation Framework for Embedded Devices
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
paolo-projects / unlocker
Forked from theJaxon/unlockerVMware Workstation macOS
16-bit CPU for Excel, and related files
📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices.
🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)
Advanced RAT written in Python language, fully controllable through Discord with dedicated GUI builder to make preparation easier.
Hacking the PixMob infrared (and now also RF!) protocol to enable control of PixMob wristbands at home.
Script for quick and easy DOS-attacks on bluetooth devices for pentest purposes
OSINT tool that allows you to find a person's accounts and emails + breached emails
This is a batch script created to WEB-DL.
MiTool : without a PC (using another phone via Termux), allows you to unlock the bootloader, flash ROMs, ... and offers many other features for Xiaomi devices
Android firmware dumper, rewritten in Python
✍️ A powerful tool designed to automatically generate a README.md file and suggest code improvements using LLMs.
Brute force and decryption of Android's Full Device Encryption
An IoT Integrated Fully Automatic WIreless PHIshing System / Advanced Wifi Pineapple
Script Cliente-Servidor para establecer una conexión reversa entre ambas máquina (máquina víctima, máquina atacante)
TP-LINK's Routers Admin Credentials Harvester Vulnerabilty
Run WPS PIN attacks (Pixie Dust and bruteforce) on your Termux
Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23.
A simple python scanner to detect vulnerable hosts in your net
A python implementation of the windows 95 product key check.