All-in-one infinity value for Python. Can be compared to any object.
☆20Jun 3, 2020Updated 5 years ago
Alternatives and similar repositories for infinity
Users that are interested in infinity are comparing it to the libraries listed below
Sorting:
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- ☆11Nov 29, 2018Updated 7 years ago
- Pyinstrument's C extensions - enables the development of a fast statistical profiler☆11Oct 8, 2021Updated 4 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year
- Documentación sobre sistemas embebidos☆12Nov 15, 2024Updated last year
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- A conglomeration of resources for any color of the rainbow☆14Feb 12, 2026Updated 3 weeks ago
- List of useful OSINT tools for information gathering. Especially for pentesters 🖖☆11May 10, 2024Updated last year
- ☆11Jul 5, 2016Updated 9 years ago
- Lazy reading of file objects for efficient batch processing☆10Sep 6, 2017Updated 8 years ago
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- Django app providing a foreign key constraint support multiple fields☆11Jun 3, 2025Updated 9 months ago
- sitemap.xml generation using lxml with support for alternates.☆13Nov 6, 2025Updated 4 months ago
- Consolidated demo and source links from Bryant Zadegan and Ryan Lester's Black Hat / DEF CON talk "Abusing Bleeding Edge Web Standards fo…☆11Aug 19, 2017Updated 8 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Jan 14, 2021Updated 5 years ago
- Blog running on jamescooke.info☆12May 17, 2024Updated last year
- Get your logs from Logentries on the comandline.☆10Jun 22, 2020Updated 5 years ago
- 🚲 DjangoCon Europe 2019 website☆13Sep 11, 2019Updated 6 years ago
- Hash Checker Bypass and Process Hacker☆18Nov 14, 2021Updated 4 years ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Sep 11, 2025Updated 5 months ago
- MySQL UDFs to work with the Google v8 javascript engine☆26Sep 26, 2014Updated 11 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- golint with warning suppression☆10Feb 3, 2016Updated 10 years ago
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- Site-wide perimeter access control for Django projects☆17Jan 6, 2026Updated 2 months ago
- Command-line Remote Access Tool (RAT)☆13Jul 1, 2020Updated 5 years ago
- 僕の自学の方法。Mi camino de aprendizaje autodidáctico. My programming self-study road.☆12Aug 13, 2025Updated 6 months ago
- Deprecated plugin for SublimeLinter for pyyaml. Use yamllint instead.☆14Apr 24, 2025Updated 10 months ago
- Adding space between Chinese/Japanese/Korean and English characters to file in Atom.io editor.☆10Aug 8, 2016Updated 9 years ago
- The simplest, most usable and most secure CLI passwords manager for GNU/Linux☆12Jan 1, 2023Updated 3 years ago
- Msgspec based serialization for django.☆33Oct 7, 2025Updated 4 months ago
- See https://github.com/django/django-docker-box☆22May 27, 2019Updated 6 years ago
- A Torrent Magnet Link Scrapper☆14Dec 4, 2019Updated 6 years ago
- Vulnerable Bank Web Application for Cyber Security Course☆13Dec 11, 2022Updated 3 years ago
- Chromium HSTS Preload list as a Python package and updated daily.☆13Updated this week
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago