Python3 source code and hack code.
☆16Dec 19, 2022Updated 3 years ago
Alternatives and similar repositories for Python3
Users that are interested in Python3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for the Hacker News Android App☆24May 13, 2015Updated 10 years ago
- But actually for hackers☆31Mar 29, 2020Updated 6 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Jun 25, 2016Updated 9 years ago
- About a year ago, I deciphered some of Verizon's Carrier Bundle type-mask system for iPhones, and used it to produce a tethering hack- th…☆11Jan 24, 2025Updated last year
- WoW 1.12.1 Various hacks and example code☆11Oct 23, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Network hacking tools written in Python☆12Dec 23, 2018Updated 7 years ago
- some hacks for iPhone☆27Dec 1, 2009Updated 16 years ago
- Code Repository for Python For Android Hacking Crash Course: Trojan Perspective, published by Packt☆23Jan 19, 2021Updated 5 years ago
- Code repository for WiFi Hacking: Wireless Penetration Testing for Beginners, published by Packt☆15Jan 30, 2023Updated 3 years ago
- Python Tutorial - || Zip Cracking || Bruteforce || Code Walk-through || Hacking/Info-Sec ||☆14Jan 30, 2019Updated 7 years ago
- Python Security/Hacking Kit☆47Nov 10, 2019Updated 6 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Tool for generating IDA scripts to aid in reverse-engineering of GTA 5.☆11Sep 19, 2016Updated 9 years ago
- Setup HiddenEye Inside Of Termux☆10Jun 9, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Debug symbols for Wii games☆13Oct 16, 2020Updated 5 years ago
- Algorithms and data structures implemented in Haskell☆11Mar 12, 2024Updated 2 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- PS3 EncDec emulator☆15Apr 26, 2018Updated 8 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20May 18, 2016Updated 9 years ago
- Some reverses☆13Apr 7, 2015Updated 11 years ago
- scetool☆20Mar 12, 2026Updated last month
- Library for the exploitation of the PSP Kernel.☆16Jan 21, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆12Feb 13, 2024Updated 2 years ago
- using python to hack☆32Mar 29, 2016Updated 10 years ago
- Phone Hacking Series 6 - iPhone Backdoor - binaries☆23Sep 19, 2021Updated 4 years ago
- Red Crucible 2 Hack Tool<br><br>In Rope n swing, Excellent password &e5PSWQtdH%#Terrible Password helloIf you actually neglect your pa…☆28Oct 5, 2014Updated 11 years ago
- ☆10Apr 2, 2023Updated 3 years ago
- Radio Frequency Reverse Engineering public class repo☆16May 14, 2020Updated 5 years ago
- Mirror of pygame repo☆11Apr 12, 2019Updated 7 years ago
- A collection of Python scripts that make daily tasks easier and quicker. Hack your way through daily tasks with hacker-scripts!☆84Oct 1, 2020Updated 5 years ago
- Steps on how to install Kali NetHunter to Nexus 6P (Angler) running Nougat 7.1.1☆15Jul 21, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A distributed file system written in low-level Python☆13Apr 10, 2021Updated 5 years ago
- A post nuclear Multi User Dungeon (MUD) written in C++.☆18Dec 1, 2025Updated 4 months ago
- TheDorkbox Comprehensive collection of Google Dorks & OSINT techniques to find Confidential Data☆30Dec 27, 2019Updated 6 years ago
- Python Experiments for Mycroft Precise Wake Word Listener☆13Nov 6, 2017Updated 8 years ago
- An interactive website for "What the f*ck Python!"☆20Dec 8, 2022Updated 3 years ago
- ☆16May 22, 2024Updated last year
- AArch64 assembler/disassembler support☆11Sep 7, 2017Updated 8 years ago