Caesar Cipher
☆35Oct 8, 2025Updated 4 months ago
Alternatives and similar repositories for CaesarCipher
Users that are interested in CaesarCipher are comparing it to the libraries listed below
Sorting:
- Flipper Zero MAX31855 Sensor app☆12Sep 10, 2023Updated 2 years ago
- A ESP8266 Based Pwnagotchi☆16Oct 21, 2019Updated 6 years ago
- a simple keylogger in python that sends the keystrokes to the server (Telegram)☆23Aug 18, 2025Updated 6 months ago
- 🛡️ ClickShield is a modern, user-friendly web application that helps users identify potentially malicious websites and phishing attempts…☆13Nov 8, 2025Updated 3 months ago
- Deep learning final year projects offer students the opportunity to explore the latest advancements in artificial intelligence and apply …☆28Updated this week
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- ☆14May 14, 2022Updated 3 years ago
- Amazon Echo skill to trigger the native Apple Find My iPhone "play sound" feature. Written in Python 3.6 and deploys easily on AWS Lambda…☆13Aug 3, 2021Updated 4 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- Code for UzLiB (Uzbek Linguistic Benchmark) for LLMs☆19Feb 20, 2026Updated last week
- Ferramenta Python com foco na geração de trabalhos acadêmicos em PDF.☆16Oct 8, 2025Updated 4 months ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 6 months ago
- ☆16Aug 25, 2025Updated 6 months ago
- Insomnia plugin to get an access token from authorization URL and save it as a template variable☆12Jul 4, 2022Updated 3 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- Just another static site generator -> あなたが恋しいです。☆11Dec 5, 2023Updated 2 years ago
- WP Juicer Tool for quick scanning of confidential information on WordPress endpoints.☆10Apr 30, 2024Updated last year
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Jul 19, 2020Updated 5 years ago
- A deliberately vulnerable website used to showcase Dastardly from Burp Suite☆10Oct 6, 2025Updated 4 months ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- Uma lista de recursos para quem deseja aprender sobre Physical Pentesting☆12Jul 28, 2025Updated 7 months ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- ☆12Aug 25, 2023Updated 2 years ago
- A tool to BruteForce ssh. An upgraded version of Hydra. Multiple bruteforce options☆11Jul 9, 2022Updated 3 years ago
- Weather Data Model☆16Mar 4, 2025Updated 11 months ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- ☆30Dec 11, 2025Updated 2 months ago
- Network scanning tool designed to detect and report changes in open ports and services over time☆13Oct 16, 2025Updated 4 months ago
- ☆37Jun 16, 2019Updated 6 years ago
- Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648☆12Jan 14, 2022Updated 4 years ago
- It's the collection of all common Question and answers that can possibly come in your exam, if you just complete these question's you wil…☆13Mar 26, 2023Updated 2 years ago
- Windows Ransomware Detection and Protection, Published by Packt☆11Mar 18, 2023Updated 2 years ago
- C library for quantum-resistant cryptographic algorithms.☆12Jun 21, 2018Updated 7 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- This repository is a collection of notes, links, tutorials, and experiences aimed at helping others. If you find it useful, please consid…☆19Jun 24, 2025Updated 8 months ago