beautiful and useful scripts
☆52Dec 9, 2021Updated 4 years ago
Alternatives and similar repositories for useful-scripts
Users that are interested in useful-scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IoT device: Hardware & Firmware☆22Nov 13, 2019Updated 6 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- ☆12Oct 1, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Vagrant setup for building a machine for CTF/exploit development☆21Apr 21, 2019Updated 7 years ago
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 10 years ago
- Shadowsocks/ShadowsocksR 账号在线监控☆12Nov 25, 2018Updated 7 years ago
- Scripts & snippets☆14Apr 28, 2026Updated 3 weeks ago
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Jul 19, 2020Updated 5 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 5 months ago
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- get pcap feature☆10Sep 24, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- Easy installers for Maru OS.☆13May 19, 2019Updated 7 years ago
- 人气(伪)ARPG——《封印》☆11May 23, 2018Updated 7 years ago
- Template repository for CCF apps☆16Feb 12, 2026Updated 3 months ago
- A table containing CTF challenge links and their corresponding walkthroughs from different platforms.☆12Oct 23, 2022Updated 3 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- ☆10Feb 10, 2020Updated 6 years ago
- Cookiecutter template for testing Python scikit-learn clustering learners.☆15Aug 22, 2022Updated 3 years ago
- 2018年国际AIOps挑战赛KPI时序异常检测比赛基于OpenMLDB部署的工程化部署实践方案☆12Aug 30, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Checklists☆16Sep 22, 2016Updated 9 years ago
- Hexo Blog☆10Feb 7, 2025Updated last year
- ☆18Feb 2, 2023Updated 3 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- A Tor Browser crawler based on selenium and phantomjs, used for work on Website Fingerprinting (WFP) Attacks.☆11Aug 25, 2017Updated 8 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- The xline-operator is a powerful tool designed to automate the process of bootstrapping, monitoring, snapshotting, and recovering an xlin…☆16Feb 19, 2024Updated 2 years ago
- my personal blog(https://lucifer.ren/blog/)☆10Mar 11, 2026Updated 2 months ago
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Quake Command-Line Application With Golang☆10Jul 20, 2023Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 3 years ago
- Semi-automated script to create binary packages for (multiple versions of) Ubuntu☆17Aug 7, 2024Updated last year
- ROSE: Robust Online Self-Adjusting Ensemble for Continual Learning from Imbalanced Drifting Data Streams☆10Jun 24, 2024Updated last year
- Introduction to Python Programming Class☆11Oct 16, 2014Updated 11 years ago
- Dynamic Weighted Majority for Imbalance Learning☆15Nov 4, 2019Updated 6 years ago
- LLM powered agents for scanning vulnerabilities on any website - Llama 3 8B, Groq, Selenium, CrewAI, Exa AI☆30Aug 8, 2024Updated last year