A peer-to-peer routing protocol to run your decentralized network.
☆24Mar 9, 2022Updated 4 years ago
Alternatives and similar repositories for py-qPeer
Users that are interested in py-qPeer are comparing it to the libraries listed below
Sorting:
- CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache/2.4.49-2.4.50)☆10Apr 8, 2022Updated 3 years ago
- Netflix Clone with Flutter☆17Aug 29, 2019Updated 6 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- Assist reverse tcp shells in post-exploration tasks☆220Oct 17, 2025Updated 5 months ago
- Threading example and documentation for PyQt5☆13Nov 16, 2023Updated 2 years ago
- Reusable mechanical parts modeled using FreeCAD together with macros and templates. Focus on aluminium slot profiles and related accessor…☆20Jun 4, 2020Updated 5 years ago
- This code is developed to detect the USB to Serial devices connected to your computer and pick out the Arduino!☆12Jan 3, 2026Updated 2 months ago
- An Unofficial continuously updated AppImage for Telegram☆13Nov 24, 2021Updated 4 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- A Collection of Android Malware☆18Feb 19, 2019Updated 7 years ago
- wxPython sample apps and demos☆18Jun 10, 2020Updated 5 years ago
- Resolve scripting API test. External page switcher proof of concept.☆20Oct 23, 2018Updated 7 years ago
- black Ip lists, dorks-collection☆17Mar 1, 2026Updated 2 weeks ago
- Some ELF Malwares☆10Mar 11, 2022Updated 4 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- to show all hidden EFIs and any APFS subvolumes☆11Jul 5, 2021Updated 4 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- PHP Base62 encoder and decoder for integers and big integers with Laravel 5 support.☆16Aug 10, 2020Updated 5 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- Convert native dll to shellcode, and support exported function☆25Feb 10, 2021Updated 5 years ago
- Linux kernel exploit☆13Oct 6, 2021Updated 4 years ago
- A Python tool to estimate the distance of an explosion in a video based on the sound delay between the flash and boom of the explosion☆34Sep 19, 2023Updated 2 years ago
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆244Jul 3, 2024Updated last year
- Slack integration for MagicMirror²☆10Sep 9, 2020Updated 5 years ago
- Icon file generator for Windows, macOS, Web☆15Oct 6, 2024Updated last year
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- A curated collection of scripts for kernel-related devops☆13Nov 23, 2023Updated 2 years ago
- Script to give overview of an Operating System☆12Jun 1, 2025Updated 9 months ago
- Side channel-based network measurement tools.☆15Sep 1, 2015Updated 10 years ago
- CVE-2021-21978 exp☆23Mar 5, 2021Updated 5 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- A collection of malware that we use for testing and training☆12Nov 11, 2020Updated 5 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- 5 cves of ntp 4.2.8p15 founded by me.☆12Apr 11, 2023Updated 2 years ago
- Terminate the eventlog thread to disable the windows eventlog☆21Apr 1, 2020Updated 5 years ago