Playground for python based project obfuscation techniques
☆119Mar 19, 2015Updated 11 years ago
Alternatives and similar repositories for python-obfuscation
Users that are interested in python-obfuscation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python Import Hooks to allow encrypted python modules in your applications. (Experimental stuff)☆33Sep 6, 2013Updated 12 years ago
- [DEPRECATED] An Obfuscator for simple Python 2 Scripts☆35Aug 30, 2017Updated 8 years ago
- This version touches disk for registry persistence.☆27Oct 6, 2015Updated 10 years ago
- Protect your python script, encrypt it as .pye and decrypt when import it☆749Mar 10, 2026Updated last month
- pyREtic is an extensible framework for in-memory Python 2.x bytecode reverse engineering☆268May 11, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- python tor client☆27Sep 19, 2015Updated 10 years ago
- ☆27Jun 8, 2018Updated 7 years ago
- DEPRECATED: A C++ Elligator2 implementation☆15Apr 17, 2020Updated 5 years ago
- pyobfuscate☆661Sep 17, 2023Updated 2 years ago
- MongoDB Login Brute Forcer☆11Jun 22, 2014Updated 11 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- Pyminifier is a Python code minifier, obfuscator, and compressor.☆1,549Jul 13, 2023Updated 2 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- !!!不建议使用了,可以使用AuditBeat!!! Linux服务器命令监控辅助脚本,ElasticSearch + Logstash + Kibana + Redis + Auditd☆28Apr 10, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Automated information gathering tool for pentest☆55Jul 7, 2016Updated 9 years ago
- 烛龙 -- 基于Docker的环境快速搭建系统☆12Dec 2, 2016Updated 9 years ago
- certbook☆58Jul 28, 2017Updated 8 years ago
- ☆10Jun 1, 2014Updated 11 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- CVE-2017-13089☆55Nov 15, 2017Updated 8 years ago
- Open-source, Thread-safe, Embedded, FAT file-system.☆22Jan 23, 2014Updated 12 years ago
- NCC Code Navigator☆55May 9, 2016Updated 9 years ago
- Hacker News written in Python☆18Feb 22, 2016Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003☆21Jan 19, 2015Updated 11 years ago
- fix time for java application using javaAgent☆24Dec 3, 2017Updated 8 years ago
- ☆91Feb 22, 2021Updated 5 years ago
- NOISE creates "real-looking" text based upon a collection of reference texts, which can then be used in emails, tweets, web searches, IRC…☆15Apr 7, 2015Updated 11 years ago
- A Decompiler can read the class file, and decompile the bytecode to java code.☆25Aug 9, 2019Updated 6 years ago
- Python Obfuscator using the Hyperion obfuscation algorythm + .py to .exe☆17Jul 6, 2022Updated 3 years ago
- Control flow obfuscation for Java code☆12Oct 3, 2021Updated 4 years ago
- Eagle is a Web Application Attack and Audit Framework. Eagle has moved to Bitbucket.☆11Nov 21, 2016Updated 9 years ago
- socat version 2☆10Aug 30, 2012Updated 13 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Capture the flag - security challenges☆13Feb 29, 2016Updated 10 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- buddycloud static site generation and gh_pages☆18Sep 8, 2016Updated 9 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- DOOM是在thorn上实现的分布式任务分发的ip端口漏洞扫描器☆137Dec 1, 2015Updated 10 years ago
- ☆79Nov 17, 2019Updated 6 years ago
- ☆36Mar 11, 2019Updated 7 years ago