Python command line tool to encrypt or decrypt multiple files at a time using AES encryption and a common password.
☆34Apr 13, 2019Updated 7 years ago
Alternatives and similar repositories for lock_files
Users that are interested in lock_files are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Module for encrypting and decrypting files.☆14Dec 17, 2015Updated 10 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Jan 10, 2017Updated 9 years ago
- Hijack a dll in a process to do something.☆14Aug 21, 2020Updated 5 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Don't just be a script Kiddie☆12Apr 19, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Discord Gen Bot Tutorial☆10Jun 18, 2024Updated last year
- Subdomain crawler with wordlist using python☆14Mar 22, 2020Updated 6 years ago
- 基于Netty封装UDP收发工具,支持设置消息重发、重发次数、重发间隔。☆12Jun 2, 2021Updated 4 years ago
- hcidump for android☆11Jan 28, 2015Updated 11 years ago
- The Android app for scanning GSM networks with OsmocomBB-compatible phones☆14Feb 24, 2021Updated 5 years ago
- python parser combinators (parsec) library☆11Oct 26, 2018Updated 7 years ago
- The fractal land generator☆15Aug 3, 2019Updated 6 years ago
- Encrypt and Decrypt any kind of file☆20Jan 6, 2018Updated 8 years ago
- 咩射频 315/433Mhz射频与红外互转 最便宜的小爱音响射频模块☆14Jul 2, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Nim module for working with CSV files☆12Jun 18, 2023Updated 2 years ago
- Read and store values from an engine management system and GPS using an Arduino to create your own "black box" flight recorder☆29Sep 9, 2009Updated 16 years ago
- public domain usb hacking logos☆12Sep 23, 2021Updated 4 years ago
- An interactive playground for the Nim programming language☆14Jul 20, 2019Updated 6 years ago
- A programming language for generative music composition using cellular automata☆17Apr 17, 2013Updated 13 years ago
- Nim bindings for wayland☆13Aug 13, 2019Updated 6 years ago
- LILT: noun, A characteristic rising and falling of the voice when speaking; a pleasant gentle accent.☆20Dec 2, 2018Updated 7 years ago
- Script Spam Call☆22Sep 23, 2020Updated 5 years ago
- This example shows how to convert AVProVideo and AVProLiveCamera texture to OpenCV Mat using AsyncGPUReadback.☆15Jul 20, 2025Updated 9 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A little (< 300 loc), incomplete TCL interpreter☆13Mar 3, 2017Updated 9 years ago
- website admin panel finder☆34Dec 29, 2020Updated 5 years ago
- Nim EVMC - Ethereum VM binary compatible interface☆15Feb 17, 2025Updated last year
- Simple encryption program using python☆13Jan 16, 2023Updated 3 years ago
- A browser Pong game, taking advantage of Idris's ability to compile to javascript.☆18Nov 20, 2014Updated 11 years ago
- Hehehehehehehe☆10Mar 29, 2020Updated 6 years ago
- A cryptographically secure pin code generator for NodeJS☆14Feb 27, 2023Updated 3 years ago
- MyScript Interactive Ink examples and user interface reference implementation for Windows WPF.☆14Mar 30, 2026Updated last month
- A series of insanely powerful minecraft kits☆11Apr 29, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A proof-of-concept DLL that prints out the password a user enters into Veracrypt while decrypting a volume.☆15Oct 26, 2018Updated 7 years ago
- Tor command line tools for Mac☆12Jan 20, 2016Updated 10 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆16Dec 8, 2022Updated 3 years ago
- mofuparser is hyper minimal ultra fast http parser.☆18Dec 19, 2018Updated 7 years ago
- contains Evil Files separated from PyHTools project to comply with PyPi's acceptable use policy☆22Jan 8, 2026Updated 3 months ago
- Listen in on TCP conversations on the network your computer is attached to☆18Jan 15, 2023Updated 3 years ago
- 🕶 Remove GPS data from your photos before you upload them.☆14Jan 29, 2018Updated 8 years ago