macOS desktop widget showing Claude Code usage limits (5-hour and 7-day windows) in real time. Built for Ubersicht.
☆83Feb 15, 2026Updated last week
Alternatives and similar repositories for claude-code-meter
Users that are interested in claude-code-meter are comparing it to the libraries listed below
Sorting:
- A Docker lab integrating Splunk SIEM with Ollama LLM via Model Context Protocol for AI-powered security operations. Features Promptfoo e…☆18Aug 17, 2025Updated 6 months ago
- Install guide for putting Debian GNU/Linux on a PogoPlug Pro☆10Jan 19, 2023Updated 3 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Linked Data MCP - A Python-based MCP server for QA over W3C semantic web and linked data standard specifications: RDF, RDFS, SPARQL, OWL,…☆20Jan 15, 2026Updated last month
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.3☆12Jan 23, 2020Updated 6 years ago
- This Python script automates interactions with LinkedIn Sales Navigator using Selenium WebDriver. It can log into LinkedIn, navigate thro…☆16Jul 15, 2024Updated last year
- Anti-stalker and surveillance detection software☆36Jan 19, 2026Updated last month
- 🐕 Linux security audit tool☆46Feb 7, 2026Updated 2 weeks ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆14Mar 4, 2019Updated 6 years ago
- See updated code here: https://github.com/rjackowens/ebay-auction-dashboard☆13Nov 21, 2019Updated 6 years ago
- evilginx2 + gophish☆14Sep 8, 2022Updated 3 years ago
- Graph Retriever Analysis and Performance Evaluation☆30Sep 8, 2025Updated 5 months ago
- ☆16Jul 5, 2017Updated 8 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆20Dec 23, 2017Updated 8 years ago
- Cisco Adaptive Security Appliance and FTD Unauthorized Remote File Reading☆17Jul 28, 2020Updated 5 years ago
- A basic web implementation of Holehe☆22Apr 8, 2025Updated 10 months ago
- A fast dictionary attack tool (700,000+ candidates per second), that attacks a supported hash with a user-defined dictionary file's candi…☆22May 3, 2021Updated 4 years ago
- badUSB ek0ms style with integrated c2☆45Oct 23, 2025Updated 4 months ago
- CVE-2025-49844 – Redis Lua Parser Use-After-Free☆64Oct 7, 2025Updated 4 months ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Oct 10, 2020Updated 5 years ago
- ☆23Aug 10, 2020Updated 5 years ago
- ☆26Jun 2, 2022Updated 3 years ago
- Geolocation for SSH brute force attacks☆30Jun 20, 2019Updated 6 years ago
- A bot to run and periodically check for stock and purchase items on BestBuy or Walmart.☆32Mar 25, 2023Updated 2 years ago
- ☆29Aug 1, 2022Updated 3 years ago
- ☆24Nov 20, 2019Updated 6 years ago
- Open Source framework for anyone to work with Perplexity Sonar☆57Apr 6, 2025Updated 10 months ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Nov 9, 2019Updated 6 years ago
- Educational cybersecurity tool that visualizes network attacks on a 3D ASCII globe. Real-time firewall log analysis with IP geolocation…☆99Oct 14, 2025Updated 4 months ago
- PACU - Phishing Automation & Campaigning Utility☆37Nov 9, 2022Updated 3 years ago
- DEFCON30 Talk Material, References and Extra Bits☆39Oct 30, 2022Updated 3 years ago
- Example: debugging TLS with Go crypto/tls KeyLogWriter☆33Nov 16, 2016Updated 9 years ago
- New PiRTO multicart for Intellivision, now based on Pico clone☆43Oct 18, 2025Updated 4 months ago
- A powerful Python script that allows you to scrape messages and media from Telegram channels using the Telethon library. Features include…☆97Feb 19, 2026Updated last week
- A DuckDB extension for graph data analytics☆121Jan 31, 2026Updated 3 weeks ago
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆110Jul 30, 2025Updated 7 months ago
- A collection of diagnostics and tools for the Commodore 64. Use with Easy Flash 3☆63Apr 9, 2020Updated 5 years ago