☆20Mar 26, 2026Updated 3 weeks ago
Alternatives and similar repositories for datasheets-csv
Users that are interested in datasheets-csv are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆28Sep 23, 2023Updated 2 years ago
- ☆42Nov 5, 2025Updated 5 months ago
- ☆42Nov 19, 2021Updated 4 years ago
- ☆28Oct 12, 2022Updated 3 years ago
- Easy to use TP screenshot parser☆26Aug 26, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- A C# Winforms based GUI app, that allows you to extract files from Drakengard 1 and 2. repacking is supported too.☆14Jul 11, 2025Updated 9 months ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- WoW Classic Addon for displaying TBC-like character stats interface☆10Jul 12, 2025Updated 9 months ago
- EDID (Enhanced Display Identification Data) Fuzzer☆19Nov 5, 2013Updated 12 years ago
- ☆16Apr 1, 2022Updated 4 years ago
- Protect your sensitive HTML content with this AES encryption HTML loader. User will need to key in password in order to view the HTML con…☆11May 5, 2015Updated 10 years ago
- ☆12Jan 25, 2016Updated 10 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Board layout☆13Jul 1, 2015Updated 10 years ago
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- AES GCM : Authenticated Encryption with Associated Data (AEAD) algorithm in Go language☆11Jan 5, 2016Updated 10 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- A wrapper library around native windows sytem APIs☆10Dec 23, 2019Updated 6 years ago
- ☆11Aug 23, 2018Updated 7 years ago
- A WoW sandbox written in Java, from scratch.☆32Dec 17, 2016Updated 9 years ago
- Repository to share simulation data and visualize them via charts for all dps-specs in World of Warcraft☆18Nov 7, 2020Updated 5 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- NSA Playset implant for bridging airgaps without radio☆17Sep 28, 2015Updated 10 years ago
- Analysis of Hearthstone replays☆11May 18, 2017Updated 8 years ago
- Software Distribution Service☆12Jul 2, 2015Updated 10 years ago
- ☆13Jan 21, 2019Updated 7 years ago
- API logger plugin for Intel Pintool☆14Nov 19, 2017Updated 8 years ago
- Launcher for the fifa live editor☆10Apr 7, 2026Updated last week
- ☆12Sep 21, 2021Updated 4 years ago
- kernel space code☆11Jun 8, 2019Updated 6 years ago
- My website☆13Jan 24, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A powerful capture and injection tool for the Android platform☆12May 4, 2020Updated 5 years ago
- ☆14Mar 28, 2018Updated 8 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆13Aug 9, 2016Updated 9 years ago
- Tools to decrypt Google Chrome, Mozilla Firefox and Microsoft Edge login/password information.☆17Apr 10, 2023Updated 3 years ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions☆12Apr 24, 2017Updated 8 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Jun 24, 2016Updated 9 years ago