Voice command assistant
☆38Nov 16, 2016Updated 9 years ago
Alternatives and similar repositories for Jarvis
Users that are interested in Jarvis are comparing it to the libraries listed below
Sorting:
- Automatic create jira issues using CSV files☆13Nov 10, 2018Updated 7 years ago
- Node.js DTLS Proxy, library and tools to connect plain-text UDP clients with plain-text UDP servers over an encrypted UDP tunnel..☆14Dec 2, 2018Updated 7 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- VAMPY - Minimal tool for RAM dumping.☆10Jul 1, 2017Updated 8 years ago
- My Collection of x64 Assembly programs with NASM☆20Oct 21, 2018Updated 7 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆62Oct 23, 2019Updated 6 years ago
- Proposing security measures and security analysis in the Fiware IoT environment.☆22Oct 4, 2018Updated 7 years ago
- docker-compose bringing up multiple vulnerable applications inside containers.☆19Jan 29, 2018Updated 8 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- Alexa prompts the user how his/her day is going, then depending on the sentiment expressed by the user, it produces a list of regularly-u…☆19Jun 26, 2017Updated 8 years ago
- bingo online do roger☆25Jul 22, 2022Updated 3 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- pentest framework☆1,242Feb 21, 2019Updated 7 years ago
- Messing about with a Cricut machine. This stuff is probably proprietary code, so I'm likely to get sued by doing this.☆14Dec 17, 2013Updated 12 years ago
- app lock android project☆16May 31, 2013Updated 12 years ago
- This repo contains the exercises, I did while reading through the Learn Python the hard way book by Zed A. Shaw☆16Sep 23, 2017Updated 8 years ago
- CTF writeups☆42Feb 26, 2026Updated last week
- ☆10Jan 26, 2015Updated 11 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 8 years ago
- Debugging PyO3 with Visual Studio Code☆16Apr 5, 2025Updated 11 months ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Arp Spoof and inject beef hook in seconds☆13Feb 2, 2014Updated 12 years ago
- TheRomanXpl0it is an italian academic CTF team from Sapienza, University of Rome.☆12Jan 30, 2026Updated last month
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- I created this USB Rubber Ducky payload a while back and just finnished touching it up a bit. Basically what it does is download malware …☆10Feb 7, 2019Updated 7 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 6 years ago
- Rust binding for Keystone assembler framework☆11Dec 9, 2018Updated 7 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- CodeBinding allows you to create bindings directly from Linq expressions in your code☆17Jul 11, 2011Updated 14 years ago
- Packages Repository☆13Oct 25, 2015Updated 10 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago
- A radio panel for Microsoft Flight Simulator 2020☆12Nov 17, 2024Updated last year