Found 226 repositories(showing 30)
x64dbg
x64Dbg plugin that enables C# plugins with hot-loading support and scripting.
xuanye
xxl-job的dotnet core 执行器实现
nandomoreirame
💎 Simple & Beautiful Jekyll theme
cherfia
A Java library that interacts with Gotenberg's different modules to convert a variety of document formats to PDF files.
DotxControlSolutions
Dotx Wind Turbine Controller (DWTC)
kbrw
Dotx is a library for DOT file parsing and generation. The whole spec https://www.graphviz.org/doc/info/lang.html is implemented.
SirTaphos
C# WPF application, written with the MVVM architectural pattern, that converts the following file types to PDF format: .jpg, .png, .bmp, .tiff, .gif, .jpeg, .xlsx, .xls, .xlt, .ods, .xltx, .doc, .docx, .docm, .rtf, .dot, .dotx, .htm, .odt, .txt, .xps, .xml, .html, .pdf, .msg, .note - Remember to unpack packages.zip
thoven87
A Gotenberg Swift Client which implements all the routes and features.
jiajunhuang
my configuration files for XMonad, Neovim
folkertvanheusden
IBM PC/XT emulator
Silent-Watcher
dotxx is a tiny CLI that makes it easy to set environment variables from a JSON file into an existing .env-style file using the @dotenvx/dotenvx API.
seanpm2001
📙️📚️💾️ uOffice software LIBrary for supporting the *.dotx file extension.
yongsk0066
convert image to excel
f1r4s
#ZIICO RANSOMWARE Beginner Ransomware program for Security Testing # About Ziico Ziico encrypts all of your documents, photos, videos, music, specific database and other important files hence rendering innaccesibility to the encrypted category. Therefore, to reaccess these encrypted files, a decryption key is required. Files that could be encrypted can vary and in most cases there is no turning back once executed. This ransomware is for study purpose and is meant to encrypt a few of your files to test whether your system security is just fine. Ziico Ransomware is built using C# thus easily embedded. There is a preety more advance version of this program which is Fully Undetectable and because of this, i cannot upload it for certain reasons. This particular program follows an AES-256,AES-128 and a SHA256 Encryption. I believe thats preety strong and has proven to bypass four anti virus programs. # Cryptography details -encrypted via AES-256 -AES key generated manually -AES key is encrypted by RSA-2048 (windows RSA implementation) The filetypes to be encrypted: .doc, .docx, .xls, .xlsx, .ppt, .pptx, .pst, .ost, .msg, .eml, .vsd, .vsdx, .txt, .csv, .rtf, .123, .wks, .wk1, .pdf, .dwg, .onetoc2, .snt, .jpeg, .jpg, .docb, .docm, .dot, .dotm, .dotx, .ppam, .potx, .potm, .edb, .hwp, .602, .sxi, .sti, .sldx, .sldm, .sldm, .vdi, .vmdk, .vmx, .gpg, .aes, .ARC, .PAQ, .bz2, .tbk, .bak, .tar, .tgz, .gz, .7z, .rar, .zip, .backup, .iso, .vcd, .bmp, .png, .gif, .raw, .cgm, .tif, .tiff, # Decryption Process key Decrypting Victims File => open ziico.sln and create the .exe file => get the SystemId from your victims through emails, prefearble a proxy chained one. => download the Decryption key => reply your victims with Decryption Tool and Passsword File # DISCLAIMER Do not attempt to tempt the law with anything contained here. Ths tool is for educational and research purposes. I will not be responsible for any illegal action executed. You shall not use this tool to harm a victim or execute the ransomare on a computer without the users permission however,you can try tool implementation on your personal computer, but at your own risk. If proven by law, this is a punishable act. # Future Development Incase of need to further the program, Contact me.
bogner
My .xmonad directory
mohdz180
The Folder To Share Template.dotx and Template.dotm
dotXiaoWangSec
DotXiaoWangSec_Tools_Win10-安全半自动化检测
Dotxcommunity
Introducing the Temporary Seduction Attack, crafted by the Dotx community. This cyberattack is a masterpiece of wickedness, designed to lure unsuspecting targets into a web of deceit. That's a taste of its malevolence.
DotX-47
OSINT-V1 is a fast, interactive, and colorful Python 3 utility developed by DotX-47 for Open-Source Intelligence (OSINT). Its primary function is to perform rapid, concurrent enumeration of a target username across a wide range of social media and online platforms.
Toilal
Bridge the gap between shell commands and .env files
wolf
No description available
mxlang
No description available
4lxs
No description available
MiddleSand
https://github.com/MiddleSand/DotX/wiki
FlaviusHouk
Library for creating UI with XAML, Bindings and MVVM.
emillon
My own XMonad configuration
cuklev
My configurations for xmonad, xmobar and others
cbpark
Configurations for xmonad
dotX12
No description available
DotX-47
DDOS47 is an educational Python script by DotX_47 that shows how automated network‑load testing works using proxies, threading, and the requests library. It fetches free HTTP and SOCKS5 proxies from multiple sources, rotates them randomly, and sends repeated GET, POST, and HEAD requests to a user‑defined URL.