cocagne / pysrpView external linksLinks
Python implementation of the Secure Remote Password protocol (SRP)
☆121Nov 5, 2024Updated last year
Alternatives and similar repositories for pysrp
Users that are interested in pysrp are comparing it to the libraries listed below
Sorting:
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- Gnome Shell Extension: Provide SSH search results in overview☆28Dec 10, 2013Updated 12 years ago
- Easy sandboxing for rust☆11Jun 19, 2016Updated 9 years ago
- Python interface for ADT Pulse security systems☆16Nov 29, 2025Updated 2 months ago
- TV show scraper/renamer thingy☆12May 10, 2013Updated 12 years ago
- Install hamachi on your raspberry pi☆16Jul 26, 2025Updated 6 months ago
- BUILD YOUR OWN BLOCKCHAIN: A PYTHON TUTORIAL Download the full Jupyter/iPython notebook from Github here Build Your Own Blockchain – The…☆19Jun 15, 2019Updated 6 years ago
- Basically black-hatting instagram to growth hack your account☆10Jul 15, 2016Updated 9 years ago
- Web Framework that extends Tornado Web organizing the application, and adding extra features.☆15Nov 8, 2025Updated 3 months ago
- A simple, lightweight Remote Access Tool written in Python☆16Apr 11, 2019Updated 6 years ago
- IP over Fibre Channel support for Qlogic HBAs☆18Jan 23, 2017Updated 9 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- Radicale IMAP authentication plugin☆17Feb 6, 2022Updated 4 years ago
- Lock encrypted root volume on suspend in Ubuntu☆17Nov 7, 2019Updated 6 years ago
- Automatically sends pin to programs getting a pin via pin-entry. This is sometimes necessary.☆27Feb 18, 2013Updated 12 years ago
- trustlessly trade ethereum for other cryptocurrencies.☆15Mar 11, 2015Updated 10 years ago
- SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.☆21Apr 14, 2025Updated 10 months ago
- Cryptographic signing, ported from BSD for Linux, that uses instructions of modern CPUs☆24Nov 9, 2020Updated 5 years ago
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 8 years ago
- Extracting bits from Microscope images of ROM Constants, and disassembling them into readable 8051 assembly code☆22Mar 22, 2021Updated 4 years ago
- uWSGI offload bridge between redis pubsub and server sent events (sse)☆22Jan 1, 2015Updated 11 years ago
- The grey fox☆25Jun 22, 2016Updated 9 years ago
- Symbolic Execution over Falcon IL☆30Aug 28, 2021Updated 4 years ago
- ☆26Mar 12, 2020Updated 5 years ago
- ☆12May 13, 2020Updated 5 years ago
- A Twitter bot that archives tweets on demand.☆27Jun 24, 2018Updated 7 years ago
- Experimenting with Warden signature cracking☆28Jan 19, 2017Updated 9 years ago
- Additional resources and references for linux-exploit-suggester.sh☆30Oct 2, 2020Updated 5 years ago
- A reader-writer lock that can be used with a Condvar.☆29Jun 2, 2016Updated 9 years ago
- Python library for interacting with the Firefox Accounts ecosystem☆35Sep 4, 2025Updated 5 months ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Jun 27, 2018Updated 7 years ago
- Participate in the 4th U.S. National Action Plan for Open Government☆13Jun 8, 2018Updated 7 years ago
- A sandboxed Python subset for safe evaluation☆32Jun 28, 2022Updated 3 years ago
- Scan pypi for typosquatting☆38Jan 23, 2023Updated 3 years ago
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- ☆22Nov 5, 2024Updated last year
- Translation for - Monster Hunter Diary: Poka Poka Airou Village DX☆12Feb 9, 2022Updated 4 years ago
- rat tool 🔥 remote control tool remote control bot remote access tool rat tool ratting 🔥mqbjwcybsg☆11Oct 31, 2024Updated last year