♻️ update single page
This commit is contained in:
parent
f0b335fb7a
commit
a3e6a5f59a
@ -11246,6 +11246,7 @@ Use [this](https://bitbucket.org/magnolia1234/bypass-paywalls-firefox-clean/src/
|
||||
* ⭐ **[ColorHexa](https://www.colorhexa.com/)** - Color Hex Encyclopedia
|
||||
* ⭐ **[Realtime Colors](https://realtimecolors.com/)** - Preview Color Palettes
|
||||
* ⭐ **[SpyColor](https://www.spycolor.com/)** or [Colouris](https://colouris.surge.sh/) - Color Model Conversions
|
||||
* ⭐ **[Color & Contrast](https://colorandcontrast.com/)** - Color / Contrast Guide
|
||||
* [ColorsAndFonts](https://www.colorsandfonts.com/) - Quickly Copy Colors & Typography Combinations
|
||||
* [Paletton](https://paletton.com/) - Color Scheme Designer
|
||||
* [Palettte](https://palettte.app/) - Color Palette Editor
|
||||
@ -11684,6 +11685,9 @@ Use [this](https://bitbucket.org/magnolia1234/bypass-paywalls-firefox-clean/src/
|
||||
* [Evervault](https://evervault.com/) - Security / Compliance Infrastructure
|
||||
* [HTTPToolkit](https://httptoolkit.com/) - Debug, Test & Build with HTTP(S)
|
||||
* [IP Intelligence](https://getipintel.net/) - Malicious Web Traffic Protection
|
||||
* [Al-Khaser](https://github.com/LordNoteworthy/al-khaser) - Anti-Malware Stress Test
|
||||
* [YARA](https://virustotal.github.io/yara/) - Malware Identification Tool
|
||||
* [Winitor](https://www.winitor.com/) - EXE Malware Assessment
|
||||
* [HTTPLeaks](https://github.com/cure53/HTTPLeaks) - HTTP Sites Leak Information
|
||||
* [Cryptography](https://pub.dev/packages/cryptography) - Dart and Flutter Cryptography Library
|
||||
* [Kali NetHunter](https://store.nethunter.com/en/) or [AndroGuard](https://github.com/androguard/androguard) - Penetration Testing / Forensics Apps
|
||||
@ -11692,6 +11696,7 @@ Use [this](https://bitbucket.org/magnolia1234/bypass-paywalls-firefox-clean/src/
|
||||
* [Radare](https://rada.re/r/), [Reverse Engineer's Toolkit](https://github.com/mentebinaria/retoolkit), [Rizin](https://rizin.re/), [Frida](https://frida.re/), [GHIDRA](https://ghidra-sre.org/) or [Cutter](https://cutter.re/) - Reverse Engineering
|
||||
* [MSTG](https://mas.owasp.org/) or [DVIA-v2](https://github.com/prateek147/DVIA-v2) - App Security Testing / Reverse Engineering
|
||||
* [challenges.re](https://challenges.re/) - Reverse Engineer Code
|
||||
* [CVE Details](https://www.cvedetails.com/) - CVE Details
|
||||
* [ImHex](https://imhex.werwolv.net) - Hex Editor / [Web Version](https://web.imhex.werwolv.net/)
|
||||
* [YASNAC](https://github.com/RikkaW/YASNAC) - SafetyNet Attestation Checker
|
||||
* [AllSafe](https://github.com/t0thkr1s/allsafe) - Intentionally Vulnerable Android App
|
||||
@ -12136,7 +12141,6 @@ Use [this](https://bitbucket.org/magnolia1234/bypass-paywalls-firefox-clean/src/
|
||||
* [HTMLColorCodes](https://htmlcolorcodes.com/) - HTML Color Codes
|
||||
* [Checkbox Land](https://www.bryanbraun.com/checkboxland/) - Render Anything as HTML Checkboxes
|
||||
* [Capsaicin](https://gpuopen.com/capsaicin/) - Direct3D12 Framework
|
||||
* [Phaser](https://phaser.io/) - Mobile HTML5 Game Framework
|
||||
* [pup](https://github.com/ericchiang/pup) - HTML Processing CLI
|
||||
* [CSS Scan](https://chromewebstore.google.com/detail/css-scan/gieabiemggnpnminflinemaickipbebgen) - CSS Editor
|
||||
* [CSS Protips](https://github.com/AllThingsSmitty/css-protips) or [CSS Reference](https://cssreference.io/) - CSS Guide
|
||||
|
Loading…
Reference in New Issue
Block a user