Scripts and code example about penetration testing, web, network and exploiting wireless devices.
☆11Jun 24, 2018Updated 7 years ago
Alternatives and similar repositories for violent-python
Users that are interested in violent-python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- port scanner & login credential tester☆15Mar 25, 2019Updated 7 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- 🍎Wende Chinese QA system (experimental)☆10Jun 1, 2021Updated 4 years ago
- python+Selenium爬虫:模拟登录+自动点击☆12Dec 11, 2017Updated 8 years ago
- Virtual service to help secure IoT devices☆12Aug 17, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A database testing library for the Robot Framework☆12Jan 21, 2022Updated 4 years ago
- Keywordlibrary for MongoDB☆15Oct 14, 2015Updated 10 years ago
- G-Surge☆10Feb 7, 2018Updated 8 years ago
- 《动手学深度学习》:面向中文读者、能运行、可讨论。英文版即伯克利“深度学习导论(STAT 157)”教材。☆10Jul 27, 2019Updated 6 years ago
- TortoiseSVN plugin for Robotframework IDE (RIDE).☆10Jan 28, 2026Updated 3 months ago
- Android AirKiss配网Java实现,支持中文WiFI名称。☆12Jul 2, 2019Updated 6 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- Application for processing Chinese text : Sentiment , Keywords , Abstract☆10Apr 13, 2017Updated 9 years ago
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 一套针对中文实体识别的BLSTM-CRF解决方案☆13Apr 21, 2018Updated 8 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 6 years ago
- AVR USB HID Bootloader that protects against malicious firmware upgrades☆13Apr 13, 2016Updated 10 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 9 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- 收集的各大公司发布的物联网安全年度报告☆13Jul 31, 2017Updated 8 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- 用python写自己的第一个区块链☆12Mar 5, 2018Updated 8 years ago
- A Multi-classification of chinese text with cnn-rnn model.☆11Jun 1, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 🀄️ WebShell Backdoor Framework☆16Jun 7, 2018Updated 7 years ago
- 利用公开的安然财务和邮件数据集,利用 PCA 和特征选择分析处理缺失的数据,再通过 朴素贝叶斯、决策树、SVM等机器学习构建筛选器,找出有欺诈嫌疑的安然员工☆10Dec 7, 2017Updated 8 years ago
- ☆10Sep 15, 2020Updated 5 years ago
- dc1的网络配置工具☆15Apr 11, 2019Updated 7 years ago
- Linux AV tests☆13Apr 23, 2019Updated 7 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- FlipperZero Database for german signals☆12May 3, 2023Updated 3 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- ☆12May 13, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆54Mar 19, 2024Updated 2 years ago
- A device security tweak for iOS.☆20Dec 27, 2021Updated 4 years ago
- A set of NRF24 apps for the Flipper Zero running an unmodified original firmware.☆10Aug 25, 2023Updated 2 years ago
- dati extra☆14Nov 5, 2023Updated 2 years ago
- OS X rootkit loader version #1☆18Apr 10, 2015Updated 11 years ago
- Using ESP32 Cam module, take photo every 3 second and store it in SD card. No need to connect WiFi or anything.☆12Jul 3, 2020Updated 5 years ago
- Create a Twilio-powered device that keeps watch over dangerous and remote locations and alerts stakeholders of intrusions or safety conce…☆22Jun 21, 2024Updated last year