armindocachada / yeelight-nvidia-rtx-ryzen-stock-checkerView external linksLinks
Simple Python script that can run in a Raspberry PI and uses Python, BeautifulSoup, Pandas and the Yeelight API to check for the stock availability of the latest Nvidia RTX and Ryzen graphics/cards and CPUs respectively
☆16Jun 24, 2021Updated 4 years ago
Alternatives and similar repositories for yeelight-nvidia-rtx-ryzen-stock-checker
Users that are interested in yeelight-nvidia-rtx-ryzen-stock-checker are comparing it to the libraries listed below
Sorting:
- Three levels of beginner-friendly CTF challenges focused on reverse engineering to help people learn and practice.☆28Nov 3, 2024Updated last year
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆150Mar 20, 2024Updated last year
- Identify the attack paths in BloodHound breaking your AD tiering☆326Nov 6, 2022Updated 3 years ago
- A full setup guide for scam-baiting with Oracle's VirtualBox.☆358Feb 19, 2022Updated 3 years ago
- RTTTL txt files that will work with the FIipperZero Music Player☆365Aug 8, 2025Updated 6 months ago
- DIY Arduino Wi-Fi Keylogger (Proof of Concept)☆367Jul 24, 2019Updated 6 years ago
- Frequency and preset adjustable subghz radio frequency jammer for Flipper Zero☆606Updated this week
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆529Jul 31, 2024Updated last year
- linikatz is a tool to attack AD on UNIX☆594Oct 19, 2023Updated 2 years ago
- Blind WAF identification tool☆713Jun 25, 2024Updated last year
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆793Oct 23, 2020Updated 5 years ago
- Detect deauthentication frames using an ESP8266☆917Aug 28, 2023Updated 2 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆973Jan 29, 2023Updated 3 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,142Oct 20, 2025Updated 3 months ago
- Wordlists for creating statistically likely username lists for use in password attacks and security testing☆1,251Aug 31, 2022Updated 3 years ago
- Username tools for penetration testing☆1,316Sep 20, 2024Updated last year
- Powershell tool to automate Active Directory enumeration.☆1,280Sep 9, 2025Updated 5 months ago
- ☆1,187Apr 23, 2017Updated 8 years ago
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,338Jul 12, 2024Updated last year
- Sample pentest report provided by TCM Security☆1,324Mar 18, 2022Updated 3 years ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,324Jan 10, 2025Updated last year
- Sub-GHz Files for the Flipper Zero☆1,413Dec 3, 2022Updated 3 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,463Mar 27, 2025Updated 10 months ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,371Apr 23, 2025Updated 9 months ago
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4☆1,389May 5, 2021Updated 4 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,527Dec 16, 2025Updated 2 months ago
- ☆1,393Apr 25, 2021Updated 4 years ago
- Starkiller is a Frontend for PowerShell Empire.☆1,615Updated this week
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,627Sep 3, 2023Updated 2 years ago
- Vite + Vue DevTools = DX 🔥☆1,620Jan 6, 2024Updated 2 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,657Nov 28, 2020Updated 5 years ago
- ☆1,781Aug 30, 2024Updated last year
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,777Jan 31, 2022Updated 4 years ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,083Jan 31, 2026Updated 2 weeks ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆2,008Jul 11, 2024Updated last year
- Abusing impersonation privileges through the "Printer Bug"☆2,173Sep 10, 2020Updated 5 years ago
- Six Degrees of Domain Admin☆2,779Updated this week
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,249Apr 12, 2024Updated last year
- CeWL is a Custom Word List Generator☆2,570Oct 21, 2025Updated 3 months ago