☆178Jan 23, 2019Updated 7 years ago
Alternatives and similar repositories for books
Users that are interested in books are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Blink LEDs in different configurable patterns☆14Jan 28, 2023Updated 3 years ago
- Android App to help D&D DMs☆10Oct 2, 2018Updated 7 years ago
- Extract Wi-Fi passwords from a non-rooted (really) Android phone☆18Feb 26, 2023Updated 3 years ago
- High-speed real time streaming video on Zybo Z7-10☆17May 5, 2019Updated 6 years ago
- Hibernate one to many web service with rest endpoints and spring boot admin☆20Oct 9, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆41Jun 28, 2023Updated 2 years ago
- Hacking the ESP8266 to play WAV files with no need for additional hardware☆23Sep 18, 2017Updated 8 years ago
- MATLAB Code associated with Mathematical Methods and Algorithms for Signal Processing by Moon, Stirling☆23Oct 31, 2016Updated 9 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- ☆29May 6, 2024Updated last year
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- lowercase AND remove Duplicates☆20Jun 20, 2022Updated 3 years ago
- intern☆10Sep 25, 2018Updated 7 years ago
- Run a Docker task on AWS ECS and stream logs back via AWS Cloudwatch Logs☆12Feb 28, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Demo plugins☆15Feb 18, 2023Updated 3 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- Arduino library to receive numbers dialed by a rotary telephone dial via pulse dialing☆51May 5, 2019Updated 6 years ago
- Miscellaneous old Exploit code and PoCs☆16Oct 1, 2024Updated last year
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- ☆11Aug 17, 2025Updated 7 months ago
- ☆15Aug 21, 2021Updated 4 years ago
- ☆14Oct 17, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Auto Completion for contacts in a mutt aliases file☆13Oct 8, 2019Updated 6 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- Summit Route End Point Protection - Server code☆11Apr 10, 2016Updated 9 years ago
- Middleman template with backbone, react, slim, and bootstrap.☆13Nov 28, 2014Updated 11 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- This proxy signs requests with AWS IAM credentials.☆13Jul 11, 2023Updated 2 years ago
- ☆11Mar 12, 2020Updated 6 years ago
- Monogame implementation of Commandos 1 game series☆13Feb 25, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- ☆13Aug 8, 2021Updated 4 years ago
- ☆24Aug 8, 2012Updated 13 years ago
- Wordpress Watcher is a wrapper for WPScan that manages scans on multiple sites and reports by email☆11Jun 23, 2020Updated 5 years ago
- machine learning and deep learning tutorials, articles and other resources☆12Oct 24, 2016Updated 9 years ago
- Blog do grupo gufers☆12Sep 30, 2022Updated 3 years ago
- Perl script to bruteforce SSH known_hosts files.☆25Jun 9, 2015Updated 10 years ago