Zythom / french-wikipedia-word-listView external linksLinks
☆25Nov 2, 2021Updated 4 years ago
Alternatives and similar repositories for french-wikipedia-word-list
Users that are interested in french-wikipedia-word-list are comparing it to the libraries listed below
Sorting:
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated 11 months ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- ☆18Nov 19, 2020Updated 5 years ago
- A Hugo theme to host Capture-The-Flag (CTF) challenges as a static website like hackropole.fr.☆17Feb 23, 2025Updated 11 months ago
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- Simulator forked from ICSim used during Car Hacking Workshops☆19Aug 30, 2024Updated last year
- ☆19Dec 5, 2024Updated last year
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Certifiable Linux Integration Platform (CLIP)☆48Jun 26, 2023Updated 2 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- CaptainCredz is a modular and discreet password-spraying tool.☆133Jul 22, 2025Updated 6 months ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Utility to decompress Linux swsusp hibernation file.☆28Aug 11, 2021Updated 4 years ago
- ☆24Feb 12, 2016Updated 10 years ago
- Markov-chains for linguistically-correct password cracking☆63Mar 15, 2022Updated 3 years ago
- Collection of our CTF write-ups☆28Aug 7, 2020Updated 5 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- ☆37Sep 29, 2020Updated 5 years ago
- Scan your account for the use of untrusted AMIs☆31Updated this week
- SD/MMC Analyzer for Saleae Logic☆39Mar 18, 2024Updated last year
- Unnoficial solutions (still under construction) to Nielsen and Chuang's "Quantum Computation and Quantum Information" - 10th anniversary …☆19Feb 10, 2026Updated last week
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated last week
- darknet crawler to map links☆10Apr 15, 2020Updated 5 years ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated last month
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- A mobile app for controlling Pulsetto devices☆18Jan 9, 2026Updated last month
- dirb is a system for creating, managing and searching complex directory structures☆10Dec 12, 2015Updated 10 years ago
- Malifar is a GPU-accelerated NSEC3 DNS zone dumper☆14Jun 4, 2024Updated last year
- ☆13Mar 6, 2010Updated 15 years ago
- pano date resolver stuff☆17Dec 3, 2025Updated 2 months ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated last month
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- ☆10May 12, 2022Updated 3 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Utility for making crosschain transactions on the Wanchain network☆13Mar 18, 2019Updated 6 years ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- Picon☆39Apr 16, 2017Updated 8 years ago