A tool for communicating with FingerTec access control devices, as well as other ZKTeco based devices
☆21Jan 10, 2017Updated 9 years ago
Alternatives and similar repositories for fingertec-tool
Users that are interested in fingertec-tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Quick and simple way to encrypt your code via OpenSSL with a key size of 16, 24 or 32 to protect your code from being seen☆16Jan 19, 2020Updated 6 years ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- BitTorrent Tracker with upload & browsing, written on the 25th Chaos Communication Congress☆33Dec 25, 2013Updated 12 years ago
- Tunnel IP over ICMP.☆16Jul 13, 2016Updated 9 years ago
- Note:- Run this Script in root user.☆16Oct 13, 2017Updated 8 years ago
- h00k☆13Jul 28, 2016Updated 9 years ago
- An ARM Assembler and Simulator/Debugger☆15Jan 26, 2010Updated 16 years ago
- VirtualBox Virtual Machines used for IPv6 training☆11Jun 6, 2016Updated 9 years ago
- Terraform Provider for LaunchDarkly☆13Nov 27, 2019Updated 6 years ago
- aws-prober is an open-source tool for ensuring a secure and cost-aware AWS foundation, based on years of AWS experience and dozens of AWS…☆14Aug 4, 2023Updated 2 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago
- PIC code gen and loading☆13Jul 25, 2017Updated 8 years ago
- Simple ways to 0wn simple IOT devices☆65Mar 27, 2015Updated 10 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- ☆23May 20, 2016Updated 9 years ago
- A python script that converts input character strings to QR Code using emojis. The output can be copied & pasted where desired.☆12Jun 25, 2019Updated 6 years ago
- WhatsApp statistics toolkit mirror☆10Mar 24, 2019Updated 6 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Office365 Tenants List☆16Jun 12, 2018Updated 7 years ago
- Code base for 2 port ONT☆10Jul 19, 2017Updated 8 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- ☆19Jun 11, 2013Updated 12 years ago
- springframework with netty☆10Mar 5, 2014Updated 12 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- Add-ons, projects, active systems, etc. for x/84☆12Dec 12, 2017Updated 8 years ago
- branched from upstream☆11May 5, 2011Updated 14 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- Port scanning and domain utility.☆30Sep 8, 2017Updated 8 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Oct 8, 2016Updated 9 years ago
- Go bindings to PJNATH - ICE, STUN, and TURN Library☆17Jul 17, 2014Updated 11 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- Vagrant setup for building a machine for CTF/exploit development☆21Apr 21, 2019Updated 6 years ago
- ROP based Movfuscator VM☆28Nov 3, 2016Updated 9 years ago
- Cache::Memcached☆28Mar 3, 2022Updated 4 years ago
- 解除Resilio Sync/BTSync限制china地区 镜像:https://coding.net/u/renerli/p/sync_hosts/git☆17Jul 27, 2018Updated 7 years ago
- stream.Transform with parallel chunk processing☆17Jan 7, 2025Updated last year