KimiNewt / aiocmdView external linksLinks
Asyncio-based automatic CLI creation tool using prompt-toolkit
☆29Dec 29, 2021Updated 4 years ago
Alternatives and similar repositories for aiocmd
Users that are interested in aiocmd are comparing it to the libraries listed below
Sorting:
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- A demo repo to graph calling and called functions flexing Ghidra's FlatProgramAPI via Pyhidra☆23Oct 2, 2024Updated last year
- Microsoft Flow Attack Framework☆23Nov 14, 2019Updated 6 years ago
- Dump exposed HTTP .git fast☆51Nov 11, 2022Updated 3 years ago
- A virus checker for nim binaries☆22Jan 10, 2026Updated last month
- Make the Windows API in Ghidra easy to read and informative.☆28Jan 10, 2022Updated 4 years ago
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆32Jun 2, 2021Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- Asynchronous RDP/VNC client for Python (GUI)☆75Jan 1, 2025Updated last year
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Jul 10, 2020Updated 5 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- Configuration and Programs for activating IMU data on Emlid Reach☆11Feb 4, 2018Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Android app for tracking your locations and uploading them on your private server☆11Jul 1, 2017Updated 8 years ago
- Socks5 server over Websockets☆40Oct 17, 2018Updated 7 years ago
- LinkedIn reconnaissance tool☆55Dec 17, 2021Updated 4 years ago
- ☆11Dec 30, 2025Updated last month
- Vulnerabilities, security advisories, exploit codes and proof-of-concept codes.☆10Updated this week
- Terrario 2 est un jeu de minage en 2D fait en Python avec le module Pygame. Gagnant des régionales Centre-Val de Loire des Trophées NSI.☆15Sep 20, 2023Updated 2 years ago
- Exploiting Linksys WRT54G using a vulnerability I found.☆37Jul 10, 2021Updated 4 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆54Jul 13, 2023Updated 2 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Jan 23, 2022Updated 4 years ago
- Micropython implementation of assisted location services (AGPS)☆13Apr 22, 2020Updated 5 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 3 years ago
- Archive of long-abandoned Borland C++ IDE versions☆18Aug 10, 2021Updated 4 years ago
- Easy cross platform encryption and decryption☆26Nov 24, 2014Updated 11 years ago
- A real-time ping plotter in Python☆11Jan 5, 2022Updated 4 years ago
- Interactive Bokeh dashboard to visualize 311 calls in NYC.☆11Jun 11, 2020Updated 5 years ago
- Ghidra's development plugins, scripts, contributing. Presentation☆13Aug 10, 2020Updated 5 years ago
- This program show you IMSI numbers of cellphones around you.☆13Dec 14, 2017Updated 8 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Repo for the testing-genai workshop☆13May 8, 2025Updated 9 months ago
- A command-line utility for generating optimum polygon label coordinates from GeoJSON☆12Mar 20, 2023Updated 2 years ago
- Sample app designed to show how to implement rudimentary HATEOAS support to an ASP.NET Core API.☆12Dec 8, 2022Updated 3 years ago
- Website for Explore California☆12Dec 22, 2018Updated 7 years ago
- Manage your Android phone from a Linux computer. File transfer, file browsing and in-place editing, screen control, tethering, reverse te…☆19Jan 13, 2025Updated last year