Manage your sdks and emulators in a light and simplified way using a webui.
☆13Jun 22, 2024Updated last year
Alternatives and similar repositories for pydroid
Users that are interested in pydroid are comparing it to the libraries listed below
Sorting:
- Documentation of main privilege escalation vulnerabilities affecting Active Directory.☆15Dec 6, 2025Updated 2 months ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- ☆17May 28, 2022Updated 3 years ago
- Python Essentials for AWS Cloud Developers, published by Packt.☆10Apr 27, 2023Updated 2 years ago
- TypeScript port of CosmosShadow/GeneralAgent☆12Dec 15, 2023Updated 2 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- This extension provides a way to discover NoSQL injection vulnerabilities.☆10Feb 1, 2021Updated 5 years ago
- Implementations of the renormalization group-based diffusion model (RGDM).☆16Mar 10, 2025Updated 11 months ago
- code for Build2Vec 1.0 reproducibility☆12Oct 28, 2021Updated 4 years ago
- A simple, reliable and reasonably fast network capture analyzer.☆25Feb 7, 2026Updated 3 weeks ago
- Repository of examples for the drones demystified! educational project☆11Jun 12, 2017Updated 8 years ago
- A collection of utility scripts and other tools that make working with Crabgrass easier.☆11Apr 3, 2020Updated 5 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- Estimate dense depth maps from RGB image and sparse depth maps☆14Oct 4, 2018Updated 7 years ago
- The solution of Traveling Salesperson Problem by using Ant Colony System algorithm and its simple 3d simulation with OpenGL☆14Apr 28, 2016Updated 9 years ago
- ☆12May 31, 2019Updated 6 years ago
- ☆10Aug 20, 2024Updated last year
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- AID: An affine invariant descriptor for SIFT.☆10Nov 21, 2022Updated 3 years ago
- ☆10Aug 17, 2021Updated 4 years ago
- ☆14Aug 22, 2025Updated 6 months ago
- ☆12Jul 7, 2023Updated 2 years ago
- ☆11Oct 27, 2020Updated 5 years ago
- Get VirusTotal report for a given hash using PowerShell☆10Sep 20, 2022Updated 3 years ago
- ☆11Sep 22, 2021Updated 4 years ago
- ☆11Aug 16, 2019Updated 6 years ago
- Code implementing the paper 'Near-Field Photometric Stereo in Ambient Light.' from BMVC 2016☆14Aug 10, 2018Updated 7 years ago
- Import custom queries into BloodHound CE from a legacy BloodHound JSON file.☆10Mar 22, 2024Updated last year
- Code, Resources - Personal project - Llama Paper Summary - October 14, 2024.☆11Oct 15, 2024Updated last year
- datasets☆11Oct 10, 2017Updated 8 years ago
- ☆11May 7, 2020Updated 5 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- a beta version of deep occlusion☆12Sep 28, 2016Updated 9 years ago
- Zabbix WebHook GLPI☆12Aug 7, 2023Updated 2 years ago
- Sleep obfuscation in golang based on ekko☆13Jan 16, 2024Updated 2 years ago
- CasCADe 4D visualization system for virtual construction planning☆15Feb 13, 2021Updated 5 years ago
- ☆13Jun 23, 2015Updated 10 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- 我写的一些文档☆13May 20, 2016Updated 9 years ago