☆40Oct 16, 2018Updated 7 years ago
Alternatives and similar repositories for password-strenth-metor
Users that are interested in password-strenth-metor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Caesar cipher encryption and decryption☆20May 22, 2023Updated 2 years ago
- this simple tool help you to detect Deauth_DoS Attack on your Machine☆25Jun 1, 2019Updated 6 years ago
- File System Integrity checker (etc)☆34Nov 14, 2017Updated 8 years ago
- It is a advanced keylogger.☆77Jul 2, 2024Updated last year
- Localization Integrity Evaluation for Mobile Robots☆12May 25, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆19Jun 21, 2024Updated last year
- Intrusion Detection System (IDS) for Wireless Sensor Networks (WSN)☆19Apr 5, 2013Updated 13 years ago
- Concurrency-optimized custom password cracker in python☆12Dec 14, 2015Updated 10 years ago
- This repository is made for WSN project in 2018. This repository contains all programs which are used on AQMS (Air Quality Monitoring Sys…☆13Sep 4, 2021Updated 4 years ago
- This project was developed using Packet Tracer version 8.2.1, showcasing a comprehensive network setup.☆15Jan 8, 2024Updated 2 years ago
- An image encryption node-js cli☆73Dec 16, 2021Updated 4 years ago
- This repository contains the complete Power BI artifacts used in the creation of a Power BI Dashboard for Road Accident Analysis.☆11Jun 21, 2023Updated 2 years ago
- BusPwn V1.0 is a powerful Modbus hacking framework designed for testing and exploiting vulnerabilities in Modbus-based systems commonly f…☆27Apr 19, 2025Updated last year
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This repository contains a Power BI solution for AtliQ hardware, enabling comprehensive analysis of sales trends, informed decision-makin…☆18Jun 5, 2023Updated 2 years ago
- Making the classroom smart using deep learning and Internet of Things☆10Jan 22, 2021Updated 5 years ago
- This system will try to provide a solution to the problem of wasting time waiting for our foods in canteen by providing an order placing…☆10Mar 29, 2026Updated 3 weeks ago
- This demo is a cutting-edge web application that enables seamless interaction with Google's Gemini 2.0 AI model through audio, video, and…☆14Mar 3, 2025Updated last year
- Mass Generate Facebook Lost Password With List or Username Email.☆13Dec 8, 2022Updated 3 years ago
- Simulation of a routing protocol for Wireless Sensor Networks(WSN).☆25Feb 2, 2024Updated 2 years ago
- Decentralized medical record storage web app☆10Mar 20, 2022Updated 4 years ago
- Network fuzzer for the modbus protocol☆22May 20, 2023Updated 2 years ago
- iOS traffic interception framework which route all device HTTP/HTTPS traffic through Burp Suite via a system-wide VPN tunnel☆41Feb 15, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆75Jan 3, 2026Updated 3 months ago
- Files required for creating a college enquiry chatbot using RASA which is an open-source machine learning framework used for building aut…☆15Dec 16, 2021Updated 4 years ago
- Deep Learning techniques can be implemented in the field of cybersecurity to handle the issues related to intrusion just as they have bee…☆24Jan 11, 2021Updated 5 years ago
- Decentralized Application for Agriculture Supply Chain Management☆19Mar 7, 2018Updated 8 years ago
- The project's main aim is to develop a web-based application that will make it possible for the former students of the College to keep in…☆13Mar 15, 2023Updated 3 years ago
- Analyze Zomato restaurant data all the world and find the insights by using Python libaries and also visualize the dataset by using Power…☆21Sep 1, 2023Updated 2 years ago
- ☆16Mar 22, 2023Updated 3 years ago
- Ever® Gauzy™ Desktop Timer App - https://gauzy.co/downloads☆23Mar 15, 2026Updated last month
- The following is a simple example of how LLMs and langchain agents can simplify asking questions to understand the security posture of a …☆23Aug 23, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Modern phishing tool with advanced functionality☆13Dec 14, 2018Updated 7 years ago
- A series of PowerShell scripts to automate the assessment of Azure IaaS security☆21Feb 18, 2026Updated 2 months ago
- A disk space renting system using blockchain technology is a platform that allows users to rent out or lease unused storage space on thei…☆16Jun 23, 2024Updated last year
- Basic tool for Information Gathering 🚀☆26Mar 26, 2024Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆36Jun 5, 2022Updated 3 years ago
- A GitHub Action that scans your public web applications after every deployment. Add this to your dev, staging and prod steps and SecureS…☆27Jun 7, 2023Updated 2 years ago
- Powering Hardware, Radio, Web, and IoT Security Assessments Trilokya OS is a powerful, security-focused operating system designed for pen…☆22Mar 4, 2026Updated last month