Program that converts the Kaspersky Password Manager export file into a CSV file.
☆19Mar 19, 2024Updated 2 years ago
Alternatives and similar repositories for Kaspersky-Password-Manager-to-CSV
Users that are interested in Kaspersky-Password-Manager-to-CSV are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ruby script for spoofing SMTP emails.☆46Feb 16, 2023Updated 3 years ago
- Soft and Hard Unlocks everything in Combat Master all using melon loader☆13Sep 11, 2024Updated last year
- A neural network library for natural language processing written in pure Clojure☆10Jul 30, 2018Updated 7 years ago
- demo material for my PowerShell Scripting Secrets presentation☆15Nov 20, 2017Updated 8 years ago
- Basic password cracker. These tools can be used to crack various types of password hashes, the program applies the technique to recover t…☆10Mar 22, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Some Python to process the Wikileaks Cablegate data.☆19Nov 30, 2010Updated 15 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- HACK ATM MACHINES NEAREST TO YOU AND BECOME RICH!!! You can hack and break into a bank’s security ATM Machine without carrying guns or an…☆19Sep 14, 2016Updated 9 years ago
- This is the app is made to hack ATM card trust wallet address withdraw and online assess☆14Oct 27, 2022Updated 3 years ago
- how to hack pattern lock☆15Dec 27, 2020Updated 5 years ago
- A web app that unlocks/bypasses password-protected excel file☆13Mar 16, 2024Updated 2 years ago
- DEF CON Hacker Tracker☆14Jul 30, 2025Updated 9 months ago
- The Source Code for the 31 Days of Windows 8☆61Dec 14, 2012Updated 13 years ago
- Serverless prisma2 example with auth and subscriptions*☆15Jan 24, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- # LIRI Bot ### Overview In this assignment, you will make LIRI. LIRI is like iPhone's SIRI. However, while SIRI is a Speech Interpretat…☆11Feb 15, 2019Updated 7 years ago
- AxSpy is an application who allow you to monitoring an Android phone for free. Ideal for parents who want to keep an eye on their childre…☆11Dec 10, 2013Updated 12 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Dec 27, 2018Updated 7 years ago
- Linux screen lock with MiBand and other bluetooth watches☆18Nov 22, 2023Updated 2 years ago
- Scripts and small programs that are packaged into termux's termux-tools package☆12Jan 23, 2026Updated 3 months ago
- HAT project is specially created to install latest update of Metasploit Framework & to install all required Reverse Engineer Tools with r…☆13Oct 28, 2019Updated 6 years ago
- Android-PIN-Bruteforce☆17Sep 12, 2021Updated 4 years ago
- Various projects aiming at unlocking and programming the MINI54ZAN microcontroller☆17Sep 30, 2020Updated 5 years ago
- Multi-Camera Person Tracking☆17Nov 30, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- read edward snowden's auotobiography "permanent record" in plain text!☆14Jan 6, 2021Updated 5 years ago
- Using pre-trained face detection and object detection models to detect and blur out people who are not the Person of Interest (PoI) as we…☆13May 20, 2019Updated 6 years ago
- # LIRI Bot ### Overview In this assignment, you will make LIRI. LIRI is like iPhone's SIRI. However, while SIRI is a Speech Interpretat…☆11Dec 9, 2022Updated 3 years ago
- ☆27Apr 5, 2026Updated 3 weeks ago
- Jakub's security research☆13Apr 17, 2026Updated 2 weeks ago
- An overview of the important facts in the Apple vs. FBI case☆19Mar 28, 2023Updated 3 years ago
- Android wormhole tool☆15Jan 20, 2016Updated 10 years ago
- Hacking your car like in movies☆17Aug 22, 2022Updated 3 years ago
- This is a repository of the source code of various malware targeting the *nix (mostly Linux) operating systems.☆16Oct 15, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆15Jun 9, 2023Updated 2 years ago
- Code and articles associated with my Wikileaks research project, but could applicable to reading up on any item in the news and visualizi…☆21Apr 4, 2015Updated 11 years ago
- Generate CIA/NSA style project codenames☆22Sep 29, 2017Updated 8 years ago
- ☆19Apr 10, 2021Updated 5 years ago
- Automate script for wifi hacking☆23Mar 31, 2026Updated last month
- Universal backend for indexing, storing, and querying documents.☆24Nov 10, 2019Updated 6 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago