Applications & Tools developed in Python
☆37Mar 9, 2026Updated last month
Alternatives and similar repositories for Mixed-Applications
Users that are interested in Mixed-Applications are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- Machine Learning & Neural Network projects in Python☆16Jan 9, 2024Updated 2 years ago
- Login application with password encryption☆15Dec 20, 2023Updated 2 years ago
- Python syntax & use of different modules with explanations☆68Dec 16, 2024Updated last year
- Malicious scripts made for testing purposes, use it legally!☆39Jan 10, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Fast PyQt5 Youtube download application☆11Dec 27, 2024Updated last year
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Apr 23, 2020Updated 6 years ago
- This folder contains the code for basic image processing methods done in python.☆11Feb 27, 2017Updated 9 years ago
- Keylogger that sends Email at a specific time☆10Apr 7, 2018Updated 8 years ago
- A keylogger program built on Python . It will send emails after recording keys.☆12May 5, 2024Updated last year
- Operating systems playground.☆16Sep 3, 2019Updated 6 years ago
- ☆10Mar 24, 2022Updated 4 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Node.js Preparation☆14Feb 14, 2025Updated last year
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Program Untuk Mendapatkan Kontak Yang Belum Kita Save Di Whatsapp☆21Jun 18, 2023Updated 2 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- Smart grid tables will convert ascii grid tables to proper html grid tables.☆18Dec 23, 2018Updated 7 years ago
- Winning data science solution for Energy Hack NL 2018. Sonnet: forecasting station load caused by solar panels.☆11May 28, 2018Updated 7 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- 🚀 RocketAPI PHP SDK for Instagram & Threads Private API 2025☆13Apr 22, 2025Updated last year
- minimalist sudo alternative: multi-user privilege escalation tool in three letters☆10Jul 5, 2022Updated 3 years ago
- This script installs, updates and runs LOIC on Linux.☆26Oct 6, 2011Updated 14 years ago
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆12Jul 14, 2023Updated 2 years ago
- Chat client and server implemented in C++11 and Qt 5.☆11Apr 14, 2015Updated 11 years ago
- NTHU EE6550 Machine Learning Course Projects (include Maximum A Posteriori Estimation, Linear Regression, Neural Network Image Classifica…☆10Sep 7, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- Example of using Pusher Channels with Asyncio and FastAPI☆11Jun 10, 2020Updated 5 years ago
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 18, 2020Updated 5 years ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 4 years ago
- Pagination for TelegramBot CallbackQuery