Miranda UPNP Tool
☆14May 9, 2024Updated last year
Alternatives and similar repositories for miranda
Users that are interested in miranda are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A fork of the dropbear SSH server with special hacks for running on minimal embedded systems.☆30May 4, 2017Updated 8 years ago
- Find articles from wikipedia/wikivoyage near given geographic location to be displayed in an interactive map through a generated kmz file☆18Mar 21, 2023Updated 3 years ago
- Helper library to parse Placemark(s) from KML file and show in Android Map V2☆11Mar 23, 2014Updated 12 years ago
- Custom XSL file to convert Google Fusion Tables KML format to CSV with geocoded coordinates☆19Mar 29, 2011Updated 14 years ago
- ☆18Feb 20, 2019Updated 7 years ago
- QlikView Extensions that plots coordinates as well as loads KML files☆15Jul 29, 2016Updated 9 years ago
- Converts OpenTX log files (with gps data) to GoogleEarth (kml file)☆10Dec 8, 2022Updated 3 years ago
- Python program to extract coordinates from a KML file.☆12Mar 11, 2025Updated last year
- A simple script for discovery and analysis of UPnP servers☆177Nov 29, 2022Updated 3 years ago
- 🔍 A simple tool to obtain long lists of ips from domains using goroutines☆26Jul 29, 2019Updated 6 years ago
- Small script to determine valid immediate values for ARM assembly☆19Nov 25, 2019Updated 6 years ago
- Class☆10Nov 10, 2020Updated 5 years ago
- A lightly modified kernel for the Nexus 6P. Based on stock Android msm sources and leanKernel☆10Mar 20, 2018Updated 8 years ago
- Forced set CIO data and Control Omron PLC CPU☆26Nov 10, 2015Updated 10 years ago
- Minimal (and intuitive to use) coroutine implement in c☆18Jan 9, 2020Updated 6 years ago
- An application-layer router for Skupper networks☆21Mar 17, 2026Updated last week
- ☆12Mar 10, 2019Updated 7 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated last year
- "Collection of IoT vulnerability research and exploits, focusing on unauthorized access, CVEs, and popular devices like TP-LINK, Tenda, D…☆20Jan 20, 2025Updated last year
- Automatically exported from code.google.com/p/emq☆10Feb 29, 2016Updated 10 years ago
- UPnP hacking scripts and tools☆77Jan 14, 2017Updated 9 years ago
- ZoneMinder is a free, open source Closed-circuit television software application developed for Linux which supports IP, USB and Analog ca…☆13Mar 10, 2026Updated 2 weeks ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Jul 13, 2021Updated 4 years ago
- Companion app for The Witcher 3☆21Sep 28, 2023Updated 2 years ago
- Kubernetes Network Attachment Provider☆13Jul 4, 2023Updated 2 years ago
- A BACnet layer for Scapy☆13Nov 25, 2015Updated 10 years ago
- ConvNet Implementation: An Object Oriented Approach using Keras API.☆23Jan 17, 2020Updated 6 years ago
- Bridging AMQP - Kafka demo☆10Aug 18, 2017Updated 8 years ago
- Offline Maps API for Android☆38Aug 3, 2024Updated last year
- ☆12Apr 4, 2022Updated 3 years ago
- A data indexing library 100% open source with no need to use any closed source embeddings or opaque code.☆16Feb 27, 2026Updated 3 weeks ago
- Convert a toaster oven into a solder reflow station for SMD circuit boards☆13Jan 20, 2022Updated 4 years ago
- Helm charts for deploying Malcolm☆16Updated this week
- ☆19Oct 25, 2024Updated last year
- ☆12Feb 23, 2016Updated 10 years ago
- A library-based attempt to increase our chances for achieving AI Alignment with an emergent AGI.☆20Apr 4, 2023Updated 2 years ago
- Enhanced sub-command completion in the tcsh shell☆10May 19, 2017Updated 8 years ago
- A simple browser extension to blur or highlight elements on any webpage.☆28Sep 30, 2025Updated 5 months ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Apr 5, 2018Updated 7 years ago