Customized version of nerdminer v2 which integrates the scrypt mining algorithm for dogecoin and litecoin
☆25Feb 21, 2025Updated last year
Alternatives and similar repositories for NerdMiner_v2_Scrypt
Users that are interested in NerdMiner_v2_Scrypt are comparing it to the libraries listed below
Sorting:
- A FOSS bitcoin miner for ESP8266 and ESP32☆158Mar 15, 2025Updated 11 months ago
- Han: ANother SOLOminer☆137Sep 7, 2024Updated last year
- A fork of Nerdminer V2 based on GeekMagic S3 hardware model☆16Aug 29, 2024Updated last year
- A bitcoin ASIC miner for the ESP32☆176Feb 26, 2026Updated last week
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- A selenium bot for doing the voice surveys at McDonalds☆11Jan 21, 2022Updated 4 years ago
- cfg files for YUMI products☆14Mar 1, 2026Updated last week
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- ☆11Apr 5, 2017Updated 8 years ago
- ☆11Aug 31, 2019Updated 6 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- Gestro revolutionises the way of controlling one’s PC in real-time with the use of hand gestures, made possible using Computer Vision app…☆13Apr 21, 2022Updated 3 years ago
- ☆22Nov 22, 2025Updated 3 months ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- A NerdSoloMiner using > Han miner☆51May 28, 2022Updated 3 years ago
- Build scripts to compile Resurrection Remix ROM☆13Mar 18, 2017Updated 8 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- ☆13Jun 7, 2025Updated 9 months ago
- ☆11Jan 5, 2022Updated 4 years ago
- Ios 11-11.1.2 Jailbreak And ios 10-10.3.3 jailbreak. ORIGINAL PROJECT: https://github.com/JosephShenton/C0F3☆13Feb 8, 2018Updated 8 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- ☆15Jul 6, 2021Updated 4 years ago
- Open Source Software used in Parrot Bebop☆10Jan 5, 2018Updated 8 years ago
- ☆15Sep 29, 2024Updated last year
- really ?☆12Feb 29, 2024Updated 2 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- CC1101_v2 module's shield for the 'Wemos ESP8266 D1 mini' board☆14Sep 22, 2024Updated last year
- Helping get up to speed with drone via examples☆11Feb 1, 2022Updated 4 years ago
- Fast tool to lookup list of IP adresses☆14Oct 5, 2022Updated 3 years ago
- An easy user interface for pentesting tools☆11Jun 13, 2021Updated 4 years ago
- This repository contains a python3 script that is used to deploy a GNS3 topology from a YAML file using GNS3 REST API.☆14Dec 8, 2022Updated 3 years ago
- Athc0n 2012 CTF setups☆15Mar 12, 2015Updated 10 years ago
- ☆16Sep 1, 2022Updated 3 years ago
- Using MCP is fun with Cyberbro!☆19Jan 27, 2026Updated last month
- auto-mine dogecoin at dogeminer.se☆13Feb 20, 2017Updated 9 years ago
- ☆12Nov 24, 2018Updated 7 years ago