BurnYourPc / SudokuLinks
SudoPy. A Python based sudoku project. Sudoku generator (five levels of difficulty), solver and difficulty rater. Create a printable pdf with as many problems from each difficulty level as you desire
☆28Updated 7 years ago
Alternatives and similar repositories for Sudoku
Users that are interested in Sudoku are comparing it to the libraries listed below
Sorting:
- VNCBruteForce - Brute Force attacks VNC with Hydra.☆24Updated 4 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆53Updated 11 months ago
- A web application which detects fake news using machine learning and natural language processing techniques.☆30Updated 4 years ago
- recover Firefox and more browsers logins☆48Updated 3 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆14Updated 2 years ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Updated 7 years ago
- Exploiting cameras with a very distinctive HTTP Server header of "JAWS/1.0".☆10Updated 2 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Updated 11 months ago
- Google Hack Database dork automatic tool.☆25Updated 7 years ago
- pentester payload ,info hunte☆11Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆16Updated 3 years ago
- DNS hijacking via dead records automation tool☆53Updated 4 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Cross platform system wide proxy server & TLS Interception library for Python☆22Updated 2 years ago
- A first look at browser-based Cryptojacking☆16Updated 7 years ago
- Simple script to convert and obscure any IP address of any host.☆23Updated 7 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- A tool for recover router password☆31Updated 7 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- LinkedIn Scraper☆19Updated 5 years ago
- Reverse Shell for Android☆24Updated 11 years ago
- Crascan is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner.☆31Updated 6 years ago
- An another JWT cracker but really fast!☆11Updated 2 years ago
- Build wordlists from the common-crawl index☆11Updated 3 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Updated last year
- Burp extension to automatically drop requests that match a certain regex.☆10Updated 2 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago