Python wrapper for gatttool from BlueZ to access Bluetooth LE Devices
☆12Nov 13, 2015Updated 10 years ago
Alternatives and similar repositories for pygatt
Users that are interested in pygatt are comparing it to the libraries listed below
Sorting:
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Jupyter wrapper kernel that logs all cell outputs to files with history tracking☆10Feb 7, 2026Updated 3 weeks ago
- ☆13Feb 7, 2016Updated 10 years ago
- Peer to Peer Payments via NFC - Built for IC Hack 2014☆10Dec 19, 2016Updated 9 years ago
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- Modular open source hardware control stack☆10Jul 8, 2016Updated 9 years ago
- Source code of 4chan.org☆16Apr 16, 2025Updated 10 months ago
- Rust API for Chrony's control & monitoring interface☆12Apr 18, 2025Updated 10 months ago
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- Specify your own keybindings in Weston.☆10Aug 25, 2022Updated 3 years ago
- The calibrator and other useful utilities for TI wireless solution based on wl12xx driver☆15Oct 3, 2020Updated 5 years ago
- Redis Backend for Jupyter's Configurable Proxy☆12Oct 25, 2022Updated 3 years ago
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 8 years ago
- Jupyter Notebook-based Application Templates for the NII Gakunin Cloud On-demand Configuration Service (OCS)☆11Dec 23, 2025Updated 2 months ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- Analizador de tráfico para dispositivos Android potencialmente comprometidos como parte de una botnet orientado a detectar ataques DDoS.☆13Jun 20, 2018Updated 7 years ago
- Ready made ducky scripts to use in nethunter Duckhunter HID attack to perform bad usb attack right at your fingertips.☆11Nov 25, 2025Updated 3 months ago
- ☆10Mar 31, 2016Updated 9 years ago
- Some concept code for bypassing the Android lock screen from recovery mode☆16Mar 28, 2011Updated 14 years ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 9 years ago
- Add conda activation to an IPython kernel spec☆10Mar 12, 2019Updated 6 years ago
- A Chrome extension to add Akamai debug headers into requests☆15Feb 18, 2015Updated 11 years ago
- Jupyter Notebook extension to run cells contained in a section with one click, then freeze them☆11Feb 20, 2026Updated last week
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- Simple Tahoe LAFS storage node☆12Jul 11, 2015Updated 10 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Educational Java Bot Virus☆10Mar 14, 2020Updated 5 years ago
- Batch Scripts for Building ArrayFire on Windows☆11Sep 23, 2017Updated 8 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- TCG Opal Control Utilities☆14Aug 27, 2017Updated 8 years ago
- Локальный сервер для тестирования торговых роботов на Tinkoff Invest API☆10May 23, 2022Updated 3 years ago
- machinelearning stuff☆13Nov 2, 2017Updated 8 years ago
- ☆76Jan 16, 2015Updated 11 years ago
- Botnet (Zombie Networks) with C# and Web Socket☆15Jul 8, 2014Updated 11 years ago
- GNU Radio blocks - CC1111 packets encoder/decoder☆57Oct 5, 2014Updated 11 years ago
- Golang package for beautiful data validation☆38Apr 16, 2016Updated 9 years ago
- Facebook Graph API for .Net☆30Apr 10, 2023Updated 2 years ago
- khadas rescue system☆13Jun 3, 2020Updated 5 years ago
- ☆10Jul 24, 2017Updated 8 years ago