Lists (1)
Sort Name ascending (A-Z)
Stars
OSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Custom 16-bit homebrew CPU, emulator, renderer, circuit, and language
Digital logic design tool and simulator
GUI tool to control the ITE gaming keyboard lights
This is a Unofficial Control Center for Avell Laptops with Linux System