A tool for communicating with FingerTec access control devices, as well as other ZKTeco based devices
☆22Jan 10, 2017Updated 9 years ago
Alternatives and similar repositories for fingertec-tool
Users that are interested in fingertec-tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Quick and simple way to encrypt your code via OpenSSL with a key size of 16, 24 or 32 to protect your code from being seen☆15Jan 19, 2020Updated 6 years ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆22Oct 22, 2019Updated 6 years ago
- BitTorrent Tracker with upload & browsing, written on the 25th Chaos Communication Congress☆33Dec 25, 2013Updated 12 years ago
- Tunnel IP over ICMP.☆16Jul 13, 2016Updated 9 years ago
- h00k☆13Jul 28, 2016Updated 9 years ago
- An ARM Assembler and Simulator/Debugger☆15Jan 26, 2010Updated 16 years ago
- VirtualBox Virtual Machines used for IPv6 training☆11Jun 6, 2016Updated 9 years ago
- CodeBreaker PS2 File Utility☆15Feb 26, 2026Updated 2 months ago
- Terraform Provider for LaunchDarkly☆13Nov 27, 2019Updated 6 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PIC code gen and loading☆13Jul 25, 2017Updated 8 years ago
- Simple ways to 0wn simple IOT devices☆65Mar 27, 2015Updated 11 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- A python script that converts input character strings to QR Code using emojis. The output can be copied & pasted where desired.☆12Jun 25, 2019Updated 6 years ago
- WhatsApp statistics toolkit mirror☆10Mar 24, 2019Updated 7 years ago
- Bitcoin private key cracker use brute force. Everyone can use it. Best wishes!☆25Nov 16, 2017Updated 8 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Autonomous configuration for golang packages with hot reload☆14Dec 3, 2015Updated 10 years ago
- Office365 Tenants List☆16Jun 12, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- Add-ons, projects, active systems, etc. for x/84☆12Dec 12, 2017Updated 8 years ago
- [DEPRECATED] SIP Swiss army knife☆19Oct 25, 2019Updated 6 years ago
- Port scanning and domain utility.☆30Sep 8, 2017Updated 8 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Oct 8, 2016Updated 9 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- ☆18Oct 4, 2016Updated 9 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Vagrant setup for building a machine for CTF/exploit development☆21Apr 21, 2019Updated 7 years ago
- This is a quickly written utility that generates a binary tree containing a summation of the nodes below it and a verifier hash. Copyrigh…☆24Nov 17, 2025Updated 6 months ago
- ROP based Movfuscator VM☆31Nov 3, 2016Updated 9 years ago
- Cache::Memcached☆28Mar 3, 2022Updated 4 years ago
- A collection of steganography tools.☆15Nov 2, 2020Updated 5 years ago
- PhpSecInfo provides an equivalent to the phpinfo() function that reports security information about the PHP environment, and offers sugge…☆47Sep 11, 2011Updated 14 years ago
- A small tool to patch PE files' import address table with an external payload DLL.☆19Mar 19, 2026Updated 2 months ago