Cryptocurrency risk scoring services list
☆338Dec 10, 2022Updated 3 years ago
Alternatives and similar repositories for crypto-risk-scoring
Users that are interested in crypto-risk-scoring are comparing it to the libraries listed below
Sorting:
- Rubber ducky WI-FI☆11Aug 30, 2021Updated 4 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- IP.blackhole is an IP blacklist that uses multiple sensors to identify network attacks (e.g. SSH brute force) and spam incidents. All rep…☆37Jul 19, 2025Updated 7 months ago
- Code examples from the book, Jupyter Notebook 101 by Michael Driscoll☆11Oct 17, 2021Updated 4 years ago
- ☆11May 17, 2023Updated 2 years ago
- ☆42Feb 27, 2022Updated 4 years ago
- ☆57Jan 28, 2024Updated 2 years ago
- ☆14Updated this week
- ☆15Aug 14, 2024Updated last year
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆19Mar 20, 2025Updated 11 months ago
- How to create an OS from scratch☆12Jan 22, 2020Updated 6 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- MCP Server for Snyk Security Scanning☆15Feb 23, 2025Updated last year
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- An inkscape 1.0 extension to apply a radius to sharp corners of a path.☆10Nov 1, 2023Updated 2 years ago
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆18Mar 19, 2025Updated 11 months ago
- Yet another minimalistic Tensorflow (re-)re-implementation of Karpathy's Pytorch re-implementation of the OpenAI GPT (Generative Pretrain…☆14Nov 18, 2022Updated 3 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.☆20Mar 13, 2024Updated last year
- Digital pen tracking OBS overlay for vtubers.☆14Oct 20, 2022Updated 3 years ago
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Aug 26, 2022Updated 3 years ago
- Tools for multilanguage & Markdown multilang☆11Apr 21, 2024Updated last year
- Simple Chatbot for testing AI Red Team tooling☆17Feb 11, 2025Updated last year
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.☆11Feb 3, 2024Updated 2 years ago
- A robust, fast and efficient 'first-class' Python Library for NTLM authentication, signing and encryption☆14Jun 22, 2016Updated 9 years ago
- Tool to extract contents from the memory of Windows systems.☆13Jul 4, 2023Updated 2 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- nacos 任意文件读写☆11Aug 29, 2024Updated last year
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated 11 months ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆20Mar 22, 2025Updated 11 months ago
- Official GitHub++ Repository☆13Aug 18, 2024Updated last year
- Scripts to demonstrate VPC Service Controls between tenant and shared projects☆12Jun 11, 2019Updated 6 years ago
- TTS Client for Coqui TTS server☆13Jan 7, 2023Updated 3 years ago
- JSON Viewer for every use☆16Jun 3, 2025Updated 9 months ago
- Nitko web server scanner☆15Sep 25, 2019Updated 6 years ago
- Template I use for my Visual C++ projects.☆12Aug 28, 2019Updated 6 years ago