bachiraoun / pylocker
PYthon LOCKER or pylocker package provides a pythonic way to create locking system that can be used for general purposes as well as for locking files upon reading or writing.
☆9Updated last year
Related projects ⓘ
Alternatives and complementary repositories for pylocker
- recover Firefox and more browsers logins☆47Updated 2 years ago
- A package of webcrawlers that crawls websites that publish CVEs, exploits, documents, any king of information related to vulnerabilitys a…☆8Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- A tool for collecting compromised email address☆9Updated 9 years ago
- An index which uses 'spiders' to crawl and explore every discoverable hidden service on Tor.☆9Updated 6 years ago
- Ransomware Traces Scanner: a file system scanner to find ransomware's manifest files or crypted files☆4Updated 7 months ago
- Mass HTTP brute forcer to detect directories and interesting technologies☆10Updated 7 years ago
- Python backdoor that uses http post/get requests to communicate☆39Updated 8 years ago
- Search bing with python☆11Updated 10 years ago
- a javascript keylogger included in a gif file☆38Updated 11 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆17Updated 11 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆12Updated 9 years ago
- ☆13Updated 6 years ago
- pentest toolbox☆28Updated 2 years ago
- Domain Seeker☆12Updated last year
- scripts for generating password wordlists☆8Updated 6 years ago
- Example packet.proxy plugins.☆21Updated 3 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆48Updated 3 years ago
- Python, Tor, Stem, Privoxy: with this tools, allow requests new connections via Tor for obtain new IP addresses.☆24Updated 5 years ago
- ☆69Updated 5 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆15Updated 8 years ago
- Virtual host brute forcer☆22Updated 10 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 7 years ago
- Twitter crawler☆11Updated 10 years ago