BurnYourPc / Sudoku
SudoPy. A Python based sudoku project. Sudoku generator (five levels of difficulty), solver and difficulty rater. Create a printable pdf with as many problems from each difficulty level as you desire
☆27Updated 7 years ago
Alternatives and similar repositories for Sudoku:
Users that are interested in Sudoku are comparing it to the libraries listed below
- Cross platform system wide proxy server & TLS Interception library for Python☆22Updated last year
- Tool to break classical ciphers like Caesar, Vigenere or Substitution ciphers☆30Updated 7 years ago
- Ctf Writeups☆10Updated 4 years ago
- Python3 Websocket AND http proxy☆42Updated 2 years ago
- converts EXE (or other binary) files to VBS scripts☆23Updated 12 years ago
- A tool for bypass certify pinning in Android apps☆25Updated 4 years ago
- Packet sniffer using scapy☆18Updated 5 years ago
- pentester payload ,info hunte☆12Updated 2 years ago
- POC for a basic C2 server using the python aiohttp framework☆15Updated 5 years ago
- A utility to quickly map IP addresses to their respective ASN☆17Updated last year
- My personal tech blog☆16Updated 3 months ago
- ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++…☆15Updated last year
- Clone of the original project https://sourceforge.net/projects/sqsh/☆10Updated last year
- Encrypt your git repo...☆46Updated 2 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Updated 4 years ago
- An index which uses 'spiders' to crawl and explore every discoverable hidden service on Tor.☆9Updated 6 years ago
- Display Languages Volatile Environment LPE☆10Updated 4 months ago
- Python framework for manipulating bulk WHOIS data from RIRs☆20Updated 2 years ago
- Face-recognition using python 2+ opencv☆7Updated 6 years ago
- Sr. Penetration Tester. Creator of Sn1per. Top 20 worldwide on @BugCrowd in 2016. OSCE/OSCP/CISSP/Security+☆26Updated 11 months ago
- Sometimes, you need to manipulate low-level functionality (C APIs, etc) from high-level languages (Python). Eg. Force the low-level calls…☆14Updated 9 months ago
- An archive of descrypt hashes for common non-personal passwords☆30Updated 2 years ago
- ☆24Updated 3 years ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Updated 6 years ago
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆16Updated 5 months ago
- C++/ CLI implementation of my read EOF Data from PE File lib.☆10Updated 5 years ago
- A crack 💥 version of Ghostify, that helps you view Instagram stories without a trace (the story owner won't know you saw their story!)☆7Updated 2 years ago
- A wordlist-based encryption key brute forcer targeting weak key choice/derivation☆27Updated 6 years ago
- My nim learning experiments☆11Updated 2 years ago
- Subdomain enumeration using Cloudflare's scanning tool.☆43Updated last year