Configurable Python Web Scraper
☆31Aug 14, 2020Updated 5 years ago
Alternatives and similar repositories for scraper
Users that are interested in scraper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- Google BigQuery API using service account credentials.☆21Feb 22, 2016Updated 10 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- A bot that offers sympathy to people who have suffered paper cuts.☆17Oct 6, 2012Updated 13 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- On the fly TCP and UDP network fuzzer☆16Jan 3, 2020Updated 6 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- Python-based Web Scraper script☆16Jun 5, 2020Updated 5 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Experimental distributed Python packaging.☆16Aug 3, 2011Updated 14 years ago
- A collection of shellcodes for BSD and Linux for exploit development☆26May 13, 2011Updated 14 years ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Exploits, Fuzzers, Scripts etc☆35Dec 30, 2025Updated 3 months ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Jan 30, 2021Updated 5 years ago
- Network Security Monitoring Framework☆49Oct 19, 2012Updated 13 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43May 27, 2015Updated 10 years ago
- A security tool to fingerprint PNG libraries used by web applications☆82Apr 28, 2019Updated 6 years ago
- High-level milestone planning for Qubes OS☆32Aug 16, 2016Updated 9 years ago
- DCAsset multi-contract token system☆18Oct 9, 2016Updated 9 years ago
- CVE-2015-3152 PoC☆43May 11, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆40Oct 22, 2015Updated 10 years ago
- Debug mobile web pages easier by having an small remote js console.☆48Jan 11, 2015Updated 11 years ago
- ☆47Oct 18, 2014Updated 11 years ago
- Easy Access Simple Agreement for Future Equity (SAFE) documents☆13Mar 31, 2015Updated 11 years ago
- simple, fast nodejs + dynamic postgis tile server☆44Mar 22, 2011Updated 15 years ago
- Android kernel module to bypass SELinux at boot☆44Apr 10, 2016Updated 10 years ago
- PyMoves☆54Oct 11, 2017Updated 8 years ago
- A sample Java application that accesses the BigQuery API using the Google Java API Client Libraries. Used in the Google BigQuery Java Cod…☆48Mar 23, 2017Updated 9 years ago
- ☆49Jun 5, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Offline.js plug-in that allows you to test how your pages respond to different connectivity states without having to use brute-force meth…☆52Mar 20, 2014Updated 12 years ago
- Official Gondor command line client☆38Dec 14, 2015Updated 10 years ago
- some tasks/solutions from CTF challenges☆68Nov 9, 2016Updated 9 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- Create a virtual-dom streamgraph☆16Sep 14, 2017Updated 8 years ago
- 64-bit TrueCrypt on macOS.☆17Nov 12, 2024Updated last year
- ☆16Jun 20, 2017Updated 8 years ago