A REST python template aimed for bigger applications using FastAPI and pydantic.
☆16Sep 9, 2022Updated 3 years ago
Alternatives and similar repositories for PythonTemplate
Users that are interested in PythonTemplate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Jan 13, 2023Updated 3 years ago
- A web app scanner☆24Jan 23, 2014Updated 12 years ago
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 3 years ago
- Windows Ransomware Detection and Protection, Published by Packt☆11Mar 18, 2023Updated 3 years ago
- Load your data into burp☆11Apr 26, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- An implementation of the Google Analytics for Mobile in python. Includes a literal translation of ga.php and a FLUP server wrapper for t…☆46Sep 14, 2012Updated 13 years ago
- A collection of http fuzzing python scripts to fuzz HTTP servers for bugs.☆16Oct 1, 2023Updated 2 years ago
- Penetration Testing / OSCP Biggest Reference Bank / Cheatsheet☆13Dec 9, 2018Updated 7 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Nov 7, 2022Updated 3 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- Low-level implementations of common networking protocols in Python 3☆11Aug 19, 2022Updated 3 years ago
- Packet sniffer using scapy☆26Mar 21, 2020Updated 6 years ago
- A python network scanner using scapy☆25Mar 21, 2020Updated 6 years ago
- Fundamentals of Machine Learning, by Packt Publishing☆22Dec 15, 2025Updated 4 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆13Apr 21, 2022Updated 4 years ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 11 months ago
- Public release of Telepathy, an OSINT toolkit for investigating Telegram chats.☆13Sep 29, 2022Updated 3 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago
- Personal blog about cyber security and challenges☆20Mar 25, 2026Updated last month
- Windows profile removal script.☆25Apr 27, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15Jan 9, 2019Updated 7 years ago
- Singer.io Tap for extracting data from the Google Analytics Reporting API☆13Apr 21, 2026Updated 2 weeks ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- Build Stunning Real-time VFX with Unreal Engine 5, Published by Packt☆20May 11, 2023Updated 2 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- ☆14Aug 18, 2023Updated 2 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Sep 30, 2020Updated 5 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆20Feb 16, 2025Updated last year
- A collection of architectures made by myself☆11Jun 12, 2019Updated 6 years ago
- ☆13Mar 18, 2026Updated last month
- Internal Network Penetration Test Playbook☆20Jul 13, 2021Updated 4 years ago
- ☆31May 28, 2022Updated 3 years ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated 4 months ago
- Various pentest stuff☆24Mar 18, 2025Updated last year