☆40Oct 16, 2018Updated 7 years ago
Alternatives and similar repositories for password-strenth-metor
Users that are interested in password-strenth-metor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Caesar cipher encryption and decryption☆21May 22, 2023Updated 2 years ago
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆229Aug 19, 2022Updated 3 years ago
- This project contains programs that will create a database of the programs installed on your PC, and match them against the NIST's CPEs (…☆25Apr 14, 2021Updated 5 years ago
- this simple tool help you to detect Deauth_DoS Attack on your Machine☆25Jun 1, 2019Updated 6 years ago
- File System Integrity checker (etc)☆34Nov 14, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- It is a advanced keylogger.☆77Jul 2, 2024Updated last year
- ☆21Jun 21, 2024Updated last year
- Intrusion Detection System (IDS) for Wireless Sensor Networks (WSN)☆19Apr 5, 2013Updated 13 years ago
- Assalamualaikum, new update DH Bomber tools. Enjoy guys 🥀💞☆11May 5, 2025Updated last year
- Concurrency-optimized custom password cracker in python☆12Dec 14, 2015Updated 10 years ago
- This project was developed using Packet Tracer version 8.2.1, showcasing a comprehensive network setup.☆16Jan 8, 2024Updated 2 years ago
- An image encryption node-js cli☆73Dec 16, 2021Updated 4 years ago
- ☆14Jun 19, 2024Updated last year
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This repository contains the complete Power BI artifacts used in the creation of a Power BI Dashboard for Road Accident Analysis.☆11Jun 21, 2023Updated 2 years ago
- Wi-Fi Deauther is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deau…☆57Nov 2, 2023Updated 2 years ago
- JSON Prompter is a powerful Chrome extension that transforms how you create structured prompts for AI models. Whether you're working with…☆30Sep 2, 2025Updated 8 months ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- Making the classroom smart using deep learning and Internet of Things☆10Jan 22, 2021Updated 5 years ago
- This system will try to provide a solution to the problem of wasting time waiting for our foods in canteen by providing an order placing…☆10Mar 29, 2026Updated last month
- Analysis on the Airbnb Dataset of New York (2023) using Microsoft Power BI.☆16Mar 8, 2024Updated 2 years ago
- AircrackNG commands guide☆21Jun 24, 2018Updated 7 years ago
- Simulation of a routing protocol for Wireless Sensor Networks(WSN).☆25Feb 2, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Decentralized medical record storage web app☆10Mar 20, 2022Updated 4 years ago
- iOS traffic interception framework which route all device HTTP/HTTPS traffic through Burp Suite via a system-wide VPN tunnel☆43Feb 15, 2026Updated 2 months ago
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆76Jan 3, 2026Updated 4 months ago
- A python implementation for secure file transfer. Course project: "Cyber Security" (KFUPM-COE451)☆17Oct 18, 2021Updated 4 years ago
- Files required for creating a college enquiry chatbot using RASA which is an open-source machine learning framework used for building aut…☆15Dec 16, 2021Updated 4 years ago
- Wireless Sensor Network for Research☆29Jul 24, 2020Updated 5 years ago
- Deep Learning techniques can be implemented in the field of cybersecurity to handle the issues related to intrusion just as they have bee…☆24Jan 11, 2021Updated 5 years ago
- Simple recon tool automates your recon process☆16Apr 15, 2023Updated 3 years ago
- Decentralized Application for Agriculture Supply Chain Management☆18Mar 7, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Simulation of Industrial process unit on ESP32 board with ModbusTCP interface☆22Sep 19, 2020Updated 5 years ago
- CloudCustodian Rules engine for cloud security and governance, DSL in yaml for policies to query, filter, and take actions on resources☆22Aug 25, 2023Updated 2 years ago
- R toolbox to explore the TRON blockchain☆10Jul 18, 2021Updated 4 years ago
- Simple network scanner built with Scapy for Python☆51Aug 1, 2020Updated 5 years ago
- Analyze Zomato restaurant data all the world and find the insights by using Python libaries and also visualize the dataset by using Power…☆21Sep 1, 2023Updated 2 years ago
- ☆16Mar 22, 2023Updated 3 years ago
- Hi, these are some scripts that i use whenever a mobile pentest task comes up . Hope they would be helpful for someone☆13Dec 14, 2023Updated 2 years ago