Basic Website template Django 2.2 Example + Python3
☆54Feb 9, 2022Updated 4 years ago
Alternatives and similar repositories for Django-example
Users that are interested in Django-example are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Abertay CMP202 Project☆36May 7, 2021Updated 4 years ago
- Showcase of DNS Exfiltration and Infiltration☆60Feb 26, 2021Updated 5 years ago
- ☆22Aug 11, 2021Updated 4 years ago
- ☆1,159Apr 21, 2021Updated 4 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 10 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Simple C# Port Scanner (Multi-Threaded)☆51Jan 23, 2021Updated 5 years ago
- A command line tool to search AttackerKB.☆54Jan 16, 2021Updated 5 years ago
- Write-ups of Try Hack me challenge machines☆10Mar 29, 2024Updated 2 years ago
- Hey there, this repository will be/is managed by JHD_Bot, No PR's are allowed and also some resources may expire as the bot just reads #r…☆18Jun 24, 2021Updated 4 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- ☆220Jul 20, 2020Updated 5 years ago
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆19Jul 21, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Jul 27, 2019Updated 6 years ago
- SSTI Payload Generator☆92Aug 8, 2022Updated 3 years ago
- ☆337Jan 23, 2020Updated 6 years ago
- Scripts created to help with post exploitation of a Windows host☆99Feb 1, 2021Updated 5 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- Challenge files☆11Sep 30, 2021Updated 4 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Oct 4, 2018Updated 7 years ago
- A BOF for lazy people☆24Apr 4, 2024Updated 2 years ago
- Don't expect much :) Just expect to learn new things!☆64Mar 11, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆11Mar 7, 2021Updated 5 years ago
- Source code of santagift.shop website.☆83Dec 5, 2022Updated 3 years ago
- A tiny tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆27May 28, 2025Updated 10 months ago
- A simple CLI tool to check WebDAV vulnerability☆14Aug 13, 2021Updated 4 years ago
- Simple script for web directory scanning☆33May 22, 2023Updated 2 years ago
- ☆12Feb 18, 2022Updated 4 years ago
- ☆18Jan 27, 2021Updated 5 years ago
- ☆18Jul 17, 2024Updated last year
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆2,763Aug 7, 2024Updated last year
- 「Rustで始めるネットワークプログラミング」 第5章(web販売版: web-versionブランチ)のリポジトリです。☆11May 8, 2020Updated 5 years ago
- LoRaWAN session cracker - A PoC for exploiting weak or shared Application Keys☆19Jun 2, 2022Updated 3 years ago
- low-cost tracing and logging for C++☆10Dec 15, 2019Updated 6 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆15Oct 22, 2025Updated 5 months ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- Create a list of possible usernames for bruteforcing☆82Feb 18, 2024Updated 2 years ago