Partially offline multi-language translator built upon Huggingface transformers.
☆16Sep 12, 2022Updated 3 years ago
Alternatives and similar repositories for translate
Users that are interested in translate are comparing it to the libraries listed below
Sorting:
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Jul 18, 2022Updated 3 years ago
- ☆21Jul 24, 2022Updated 3 years ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆17Sep 25, 2023Updated 2 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- My inputs for the LLM Gandalf made by Lakera☆48Sep 18, 2023Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆32Feb 13, 2026Updated 3 weeks ago
- ☆22Dec 30, 2025Updated 2 months ago
- HomePlugAV tools to test PLC (in)security☆46Dec 19, 2024Updated last year
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- Python code to Serialize and Unserialize java binary serialization format.☆30Feb 27, 2026Updated last week
- Recon scripts for Red Team and Web blackbox auditing☆25Updated this week
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Oct 29, 2024Updated last year
- Decode obfuscated ldap_default_authtok from sssd.conf☆28Mar 7, 2019Updated 7 years ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆55Apr 27, 2023Updated 2 years ago
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆14Oct 14, 2024Updated last year
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆31Mar 2, 2022Updated 4 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆28Apr 6, 2022Updated 3 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆60Aug 21, 2024Updated last year
- ☆64Jan 2, 2024Updated 2 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Sep 14, 2023Updated 2 years ago
- Our team's CTF writeups☆11Jan 15, 2020Updated 6 years ago
- CVE-2018-6066 using VBA☆67Oct 24, 2022Updated 3 years ago
- CVSS (Common Vulnerability Scoring System) v3.1 Javascript calculator toolkit☆66Aug 23, 2024Updated last year
- ☆39Apr 3, 2023Updated 2 years ago
- HydraUSB3 V1 is an open source developer kit for the WCH CH569 MCU to experiment with streaming / high-speed protocols(USB2 HS, USB3 SS, …☆38Jan 22, 2024Updated 2 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Apr 12, 2022Updated 3 years ago
- UPX - the Ultimate Packer for eXecutables☆67Mar 9, 2022Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆102Jul 22, 2021Updated 4 years ago
- ☆42Mar 13, 2023Updated 2 years ago
- Shade Sanctuary, a theme designed for Obsidian MD☆18Aug 12, 2024Updated last year
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆60Apr 29, 2023Updated 2 years ago
- ☆41Aug 12, 2022Updated 3 years ago
- Write ups for Ph0wn CTF☆48Aug 12, 2025Updated 6 months ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago