☆12Jun 20, 2020Updated 5 years ago
Alternatives and similar repositories for factorization
Users that are interested in factorization are comparing it to the libraries listed below
Sorting:
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- A lightweight type converter python library.☆13Oct 1, 2020Updated 5 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- ☆13May 3, 2024Updated last year
- A JetBrains IDE plugin that integrates OpenCode — the open-source AI coding agent — directly into your development workflow.☆23Feb 8, 2026Updated 2 weeks ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- Data Feed Manager (news watch orchestrator to predict topic with deepdetect and store cleaned text in elasticsearch)☆40Nov 22, 2022Updated 3 years ago
- A HTML+CSS+JS game to learn the arabic alphabet.☆10Mar 4, 2023Updated 2 years ago
- A Django auction system.☆10Jan 23, 2013Updated 13 years ago
- Firefox and Chrome compatible extension that acts as annotation tool for websites (Named Entity Recognition)☆10Feb 17, 2019Updated 7 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- A library to simplify the creation of standardized API responses☆12Oct 14, 2024Updated last year
- Generador y solucionador de laberintos utilizando técnicas de IA basadas en el paradigma de agentes☆10Jun 12, 2024Updated last year
- PHP SDK☆10May 14, 2024Updated last year
- NLP on Korean news articles. Automatic topic extraction through dynamic clustering.☆12Sep 15, 2017Updated 8 years ago
- Simplified MITRE Use Cases, it describes the Attack and Detection☆49Sep 29, 2020Updated 5 years ago
- Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.☆43Dec 9, 2020Updated 5 years ago
- ☆15Sep 4, 2020Updated 5 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Follow-up Docker Practical Course From Tresmerge YouTube Channel☆11Apr 26, 2023Updated 2 years ago
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 5 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Applied Data Science training course (for updates and resources, read the ReadMe file below)☆15Sep 9, 2023Updated 2 years ago
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆11Dec 23, 2019Updated 6 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- CTF challenge solutions and writeups☆11Mar 2, 2024Updated last year
- ☆11May 16, 2019Updated 6 years ago
- Simple smtp server in go☆11Jul 17, 2017Updated 8 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Easy python script to find flats from ebay-kleinanzeigen, immowelt, immonet, wg-gesucht☆11May 26, 2025Updated 9 months ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- SSRF (Server Side Request Forgery) testing resources☆12Sep 7, 2017Updated 8 years ago
- ☆14Feb 25, 2022Updated 4 years ago
- Just simple helper tool for generate github search link☆18Feb 28, 2021Updated 5 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago