☆39Oct 16, 2018Updated 7 years ago
Alternatives and similar repositories for password-strenth-metor
Users that are interested in password-strenth-metor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Caesar cipher encryption and decryption☆20May 22, 2023Updated 2 years ago
- this simple tool help you to detect Deauth_DoS Attack on your Machine☆25Jun 1, 2019Updated 6 years ago
- File System Integrity checker (etc)☆33Nov 14, 2017Updated 8 years ago
- It is a advanced keylogger.☆77Jul 2, 2024Updated last year
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Localization Integrity Evaluation for Mobile Robots☆12May 25, 2020Updated 5 years ago
- ☆17Jun 21, 2024Updated last year
- Intrusion Detection System (IDS) for Wireless Sensor Networks (WSN)☆19Apr 5, 2013Updated 12 years ago
- Concurrency-optimized custom password cracker in python☆12Dec 14, 2015Updated 10 years ago
- This project was developed using Packet Tracer version 8.2.1, showcasing a comprehensive network setup.☆15Jan 8, 2024Updated 2 years ago
- This repository is made for WSN project in 2018. This repository contains all programs which are used on AQMS (Air Quality Monitoring Sys…☆13Sep 4, 2021Updated 4 years ago
- An image encryption node-js cli☆74Dec 16, 2021Updated 4 years ago
- This project leverages data analytics to gain insights into gender diversity and inclusion within the company. The Power BI dashboard and…☆21Mar 14, 2024Updated 2 years ago
- This repository contains the complete Power BI artifacts used in the creation of a Power BI Dashboard for Road Accident Analysis.☆11Jun 21, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Wi-Fi Deauther is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deau…☆57Nov 2, 2023Updated 2 years ago
- This demo is a cutting-edge web application that enables seamless interaction with Google's Gemini 2.0 AI model through audio, video, and…☆12Mar 3, 2025Updated last year
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- Making the classroom smart using deep learning and Internet of Things☆10Jan 22, 2021Updated 5 years ago
- This system will try to provide a solution to the problem of wasting time waiting for our foods in canteen by providing an order placing…☆10Feb 28, 2026Updated last month
- File Type Identification Tool & Metadata extractor intended for automation☆30May 26, 2025Updated 10 months ago
- Simulation of a routing protocol for Wireless Sensor Networks(WSN).☆25Feb 2, 2024Updated 2 years ago
- AircrackNG commands guide☆21Jun 24, 2018Updated 7 years ago
- Decentralized medical record storage web app☆10Mar 20, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- iOS traffic interception framework which route all device HTTP/HTTPS traffic through Burp Suite via a system-wide VPN tunnel☆41Feb 15, 2026Updated last month
- A network scanner project. The idea was from cybercademy.org. [Still not complete, will work on during the summer break]☆75Jan 3, 2026Updated 2 months ago
- A python implementation for secure file transfer. Course project: "Cyber Security" (KFUPM-COE451)☆17Oct 18, 2021Updated 4 years ago
- Wireless Sensor Network for Research☆29Jul 24, 2020Updated 5 years ago
- Deep Learning techniques can be implemented in the field of cybersecurity to handle the issues related to intrusion just as they have bee…☆24Jan 11, 2021Updated 5 years ago
- Simple recon tool automates your recon process☆16Apr 15, 2023Updated 2 years ago
- Decentralized Application for Agriculture Supply Chain Management☆19Mar 7, 2018Updated 8 years ago
- CloudCustodian Rules engine for cloud security and governance, DSL in yaml for policies to query, filter, and take actions on resources☆22Aug 25, 2023Updated 2 years ago
- Analyze Zomato restaurant data all the world and find the insights by using Python libaries and also visualize the dataset by using Power…☆20Sep 1, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- R toolbox to explore the TRON blockchain☆10Jul 18, 2021Updated 4 years ago
- Python Script that allows user to encrypt or decrypt images and save it.☆34Jun 20, 2023Updated 2 years ago
- Hi, these are some scripts that i use whenever a mobile pentest task comes up . Hope they would be helpful for someone☆13Dec 14, 2023Updated 2 years ago
- Modern phishing tool with advanced functionality☆13Dec 14, 2018Updated 7 years ago
- A series of PowerShell scripts to automate the assessment of Azure IaaS security☆21Feb 18, 2026Updated last month
- End to End Malicious URL Detection Project using Machine learning and deep learning☆27Apr 25, 2023Updated 2 years ago
- Basic tool for Information Gathering 🚀☆23Mar 26, 2024Updated 2 years ago