Simple Python Chess Program
☆23Oct 1, 2020Updated 5 years ago
Alternatives and similar repositories for JePyChess
Users that are interested in JePyChess are comparing it to the libraries listed below
Sorting:
- dirb is a system for creating, managing and searching complex directory structures☆10Dec 12, 2015Updated 10 years ago
- Malifar is a GPU-accelerated NSEC3 DNS zone dumper☆14Jun 4, 2024Updated last year
- ☆12Feb 8, 2019Updated 7 years ago
- Run command in a selected docker image over directory you are in☆11Apr 26, 2017Updated 8 years ago
- Python script for carving Bitlocker VMK keys☆25Feb 4, 2026Updated 3 weeks ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Jun 1, 2015Updated 10 years ago
- ☆12Oct 10, 2024Updated last year
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- old website files☆10Jun 30, 2016Updated 9 years ago
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated last month
- Using the Raspberry Pi Zero as a HID device☆13Aug 7, 2017Updated 8 years ago
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆10Dec 6, 2017Updated 8 years ago
- Quick Kubernetes cluster setup☆12Jul 21, 2015Updated 10 years ago
- Burp Suite Extension - Trigger actions and reshape HTTP request and response traffic using configurable rules☆19Nov 29, 2024Updated last year
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated 11 months ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- Saltstack formula to install Alcali: a web based tool(GUI) for monitoring and administrating Saltstack Salt.☆13Jul 12, 2024Updated last year
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16May 26, 2017Updated 8 years ago
- Ghost deployment using docker-compose☆10Jun 27, 2015Updated 10 years ago
- LotusCMS 3.0 eval() Remote Command Execution☆14Feb 10, 2013Updated 13 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- PNG IDAT chunks ~ payload generator☆15Jun 14, 2016Updated 9 years ago
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆20Jun 20, 2024Updated last year
- nmapParser.py is a tool developed for consultants doing nmap scans against a large range of hosts. I found it easy to identify hosts that…☆13Jan 19, 2016Updated 10 years ago
- ☆18Apr 30, 2016Updated 9 years ago
- Random (silly) name generator for Golang☆20Oct 16, 2019Updated 6 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Aug 14, 2017Updated 8 years ago
- The easiest way to deploy multi-cloud providers and production-grade Kubernetes stack☆16Apr 3, 2017Updated 8 years ago
- Deadly simple HipChat API V2 room notification library☆15Oct 3, 2019Updated 6 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- This is a compilation of various shells that I had found in the wild.☆15May 30, 2013Updated 12 years ago
- SaltStack for Kubernetes☆15Apr 9, 2015Updated 10 years ago
- Cron-in-docker☆17Mar 20, 2020Updated 5 years ago
- Basic examples for MITMf☆16Aug 28, 2015Updated 10 years ago
- ☆18Apr 7, 2025Updated 10 months ago
- ☆29Oct 17, 2018Updated 7 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago