PYTinyDNS
☆53Jul 2, 2014Updated 11 years ago
Alternatives and similar repositories for pytinydns
Users that are interested in pytinydns are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SEQ/Ack signature triggered SSL back connect☆10May 20, 2016Updated 9 years ago
- "Polymorphic" shellcode generator (x86)☆27Oct 28, 2014Updated 11 years ago
- The defuse.ca pastebin.☆23Jan 16, 2019Updated 7 years ago
- Synergy 1.4.12 cracking tool.☆17Mar 1, 2016Updated 10 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SSH Two-factor Authentication Module in Python☆15Dec 31, 2013Updated 12 years ago
- Extremely simple but inefficient x86-64 assembly obfuscation.☆39Mar 1, 2016Updated 10 years ago
- Host files with DNS☆32Mar 1, 2016Updated 10 years ago
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Feb 16, 2014Updated 12 years ago
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- Design for an economical and simple air-gapped system.☆27Jun 22, 2014Updated 11 years ago
- Multi-threaded SSH Password Auditor☆93Feb 4, 2014Updated 12 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆40Oct 14, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A PHP hash cracker.☆23Feb 10, 2014Updated 12 years ago
- IPython Notebook for Sentiment Classification☆10Nov 12, 2014Updated 11 years ago
- Generating passwords in PHP.☆40Oct 18, 2022Updated 3 years ago
- Non-C Implementations of the yescrypt KDF.☆30Jan 16, 2019Updated 7 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- Security related useful Powershell scripts☆19Sep 13, 2019Updated 6 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆41Sep 6, 2015Updated 10 years ago
- Python library to get the Alexa rank of the domain of any URL☆10Jan 28, 2013Updated 13 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆13Apr 6, 2016Updated 10 years ago
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- Dockerized apps.☆19Mar 23, 2016Updated 10 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Apr 1, 2014Updated 12 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- TCP/UDP symmetric encryption tunnel wrapper☆123Jul 14, 2020Updated 5 years ago
- Named Entity Extraction on Twitter Stream using Apache Spark Streaming and Stanford CoreNLP☆15Oct 12, 2016Updated 9 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- A complete Python SSH/SFTP library based on libssh.☆17Mar 5, 2018Updated 8 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- fuck☆25Feb 18, 2016Updated 10 years ago
- ☆11Apr 30, 2015Updated 10 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 11 years ago
- ☆12May 6, 2021Updated 4 years ago