Google's Bard ChatBot Unofficial NodeJS API
☆20Apr 21, 2023Updated 3 years ago
Alternatives and similar repositories for bard-unofficial-api
Users that are interested in bard-unofficial-api are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12May 6, 2024Updated 2 years ago
- [Archived since youtube api is not accessible anymore] Wasm showcase for webm/opus remuxing and fast-seeking on browser☆17Dec 27, 2024Updated last year
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Fetch all Honeypot☆12Oct 3, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- IBM QRadar opinionated API client in Go☆13Mar 15, 2023Updated 3 years ago
- Clang SA checkers developed as part of the Melange framework☆17Nov 30, 2015Updated 10 years ago
- intel amt honeypot☆18May 9, 2017Updated 9 years ago
- Spanish Word Syllabization in Python!☆16Dec 14, 2018Updated 7 years ago
- A javascript based botnet/C&C to remotely manage/control browsers.☆23Feb 4, 2022Updated 4 years ago
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- Volatility Plugins☆22May 1, 2015Updated 11 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- AFL "mostly" ported to cygwin☆26Apr 11, 2016Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆33Oct 25, 2016Updated 9 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆29Apr 23, 2021Updated 5 years ago
- ☆25Apr 8, 2016Updated 10 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Material from our CANAPE workshop☆32Nov 26, 2018Updated 7 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- unnamed japanese text analyzer☆26Sep 28, 2017Updated 8 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- An extendable, tabbed, dockable UI widget plugin for BinaryNinja https://binary.ninja.☆37Sep 18, 2016Updated 9 years ago
- ℁ Retrieve your external IP address via DNS☆16Mar 3, 2023Updated 3 years ago
- Random code snippets☆25Dec 16, 2025Updated 5 months ago
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- A tool programmed to shorten links/mask links☆12Oct 17, 2021Updated 4 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Apr 13, 2018Updated 8 years ago
- A biblioteca ES32Lab tem como objetivo facilitar a vida dos programadores que estejam desenvolvendo programas para projetos que utilizam …☆10May 7, 2026Updated 2 weeks ago
- A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32. This fork is intended for enthusiasts who want to build the device…☆11Dec 29, 2022Updated 3 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- ARP Exploitation in Python☆11Feb 19, 2017Updated 9 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- ☆15Apr 20, 2023Updated 3 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Aug 23, 2016Updated 9 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago