cocagne / pysrpView external linksLinks
Python implementation of the Secure Remote Password protocol (SRP)
☆121Nov 5, 2024Updated last year
Alternatives and similar repositories for pysrp
Users that are interested in pysrp are comparing it to the libraries listed below
Sorting:
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- PoWx mission: Aiming at smaller energy per hash hardware.☆11Dec 18, 2021Updated 4 years ago
- Gnome Shell Extension: Provide SSH search results in overview☆28Dec 10, 2013Updated 12 years ago
- Python interface for ADT Pulse security systems☆16Nov 29, 2025Updated 2 months ago
- MitM proxy which performs opportunistic SSL/TLS stripping☆17Nov 5, 2019Updated 6 years ago
- TV show scraper/renamer thingy☆12May 10, 2013Updated 12 years ago
- BUILD YOUR OWN BLOCKCHAIN: A PYTHON TUTORIAL Download the full Jupyter/iPython notebook from Github here Build Your Own Blockchain – The…☆19Jun 15, 2019Updated 6 years ago
- A simple, lightweight Remote Access Tool written in Python☆16Apr 11, 2019Updated 6 years ago
- Basically black-hatting instagram to growth hack your account☆10Jul 15, 2016Updated 9 years ago
- Web Framework that extends Tornado Web organizing the application, and adding extra features.☆15Nov 8, 2025Updated 3 months ago
- Install hamachi on your raspberry pi☆16Jul 26, 2025Updated 6 months ago
- A simple, extensible, python-powered IRC bot.☆20Apr 15, 2019Updated 6 years ago
- A binary ninja plugin to detect crypto☆70Sep 22, 2023Updated 2 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- Network Traffic Fuzzer☆17Dec 28, 2024Updated last year
- A set of python scripts for use with the CANtact CAN bus logger☆16Jan 18, 2017Updated 9 years ago
- Secure storage for cryptographic secrets, modeled after sudo☆78Mar 20, 2020Updated 5 years ago
- [F]aster [U]niversal [U]npacker☆60Jul 27, 2013Updated 12 years ago
- IMSI Catcher Catcher☆24Jun 25, 2016Updated 9 years ago
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 8 years ago
- uWSGI offload bridge between redis pubsub and server sent events (sse)☆22Jan 1, 2015Updated 11 years ago
- Extracting bits from Microscope images of ROM Constants, and disassembling them into readable 8051 assembly code☆22Mar 22, 2021Updated 4 years ago
- CryptAByte.com is a free online drop box that enables secure (encrypted) message and file sharing over the web using a public-key infrast…☆34Nov 23, 2025Updated 2 months ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆26Nov 21, 2020Updated 5 years ago
- Postgres extension creating a pool of background workers☆25Jan 11, 2025Updated last year
- Basic setup with random user agents and IP addresses for Python Scrapy Framework.☆56Dec 19, 2017Updated 8 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- ☆27Oct 31, 2025Updated 3 months ago
- ☆12May 13, 2020Updated 5 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆26Oct 13, 2019Updated 6 years ago
- Kyoto Tycoon FDW for PostgreSQL☆39Jul 4, 2016Updated 9 years ago
- ☆29Apr 22, 2017Updated 8 years ago
- Additional resources and references for linux-exploit-suggester.sh☆30Oct 2, 2020Updated 5 years ago
- Experimenting with Warden signature cracking☆28Jan 19, 2017Updated 9 years ago
- Python Remote Access Tool☆25Feb 21, 2020Updated 5 years ago
- Example of building and running an eBPF program in Rust☆33Sep 27, 2018Updated 7 years ago
- A reader-writer lock that can be used with a Condvar.☆29Jun 2, 2016Updated 9 years ago
- Proof of concept for injecting payloads into the WoW 3.3.5a client using Warden☆25Mar 23, 2024Updated last year