Calculate the check digit of a card number according to the Luhn formular
☆54Nov 17, 2020Updated 5 years ago
Alternatives and similar repositories for luhn
Users that are interested in luhn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Look up BIN/IIN numbers using binlist.net☆139Jan 16, 2023Updated 3 years ago
- Validation and control key generation against Luhn formula in javascript.☆14Dec 30, 2022Updated 3 years ago
- Linux kernel for TrueNAS SCALE☆35Updated this week
- unlock android phone using Bruteforce☆13May 23, 2021Updated 4 years ago
- Payload delivery via URL and some social engineering.☆17Jul 13, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- AutoKali automatically installs useful programs and scripts for recon, enumeration and exploitation for Kali Linux that aren't included b…☆18Jul 20, 2023Updated 2 years ago
- A library to handle Apple Property List format in binary or XML☆18Feb 11, 2012Updated 14 years ago
- Android bruteforce tool,,This repository will help you to unlock the Android phone by HID && ADB Attack..☆15Dec 14, 2021Updated 4 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Clearing numbers for Swedish banks☆13Sep 19, 2024Updated last year
- How to Hack an Android Phone using an Malicious Android Application - Part-2 (More Sophisticated Way)☆11Oct 26, 2021Updated 4 years ago
- Find usernames across over 75 social networks This is useful if you are running an investigation to determine the usage of the same usern…☆16May 11, 2021Updated 4 years ago
- OSINT toolkit☆20May 29, 2025Updated 11 months ago
- EMV Framework is a Python EMV client-side implementation that allow to comunicate with payment cards through ISO7816-4/EMV☆40Dec 11, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆10Nov 9, 2020Updated 5 years ago
- iDevice Bootloader Recovery Shell☆23Jan 17, 2013Updated 13 years ago
- Get latest tweets☆11Oct 15, 2018Updated 7 years ago
- Restores firmware and filesystem to iPhone/iPod Touch☆12Jun 7, 2010Updated 15 years ago
- A library to handle Apple Property List format whereas it's binary or XML☆53Aug 23, 2010Updated 15 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- xnu exploitation toolkit☆17Apr 11, 2016Updated 10 years ago
- ☆14Jan 14, 2021Updated 5 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This application scans all the processes running on your Android Machine and will kill any malicious process. Done by Matt Khazaeli☆10Dec 4, 2016Updated 9 years ago
- ☆10Apr 29, 2020Updated 6 years ago
- pen testing scripts☆12Feb 7, 2021Updated 5 years ago
- A helper to compare and identify similar keywords using PHP.☆10May 28, 2023Updated 2 years ago
- FidoU2F Javacard Applet for JCIDE users (tested with JC30M48CR)☆17Dec 15, 2016Updated 9 years ago
- steal password mozilla firefox ,windows,Linux☆10Oct 12, 2020Updated 5 years ago
- Example implementations of Go servers based on generated code from OpenAPI 3 definitions☆11Jun 23, 2023Updated 2 years ago
- Helpers for testing with React's shallow renderer☆16Mar 1, 2016Updated 10 years ago
- Very simple library to calculate and validate Luhn numbers☆26Nov 1, 2013Updated 12 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Curated list of custom (and potentially malicious) telegram clients☆18Aug 16, 2024Updated last year
- How to Hack an Android Phone using an Malicious Android Application (Part-1)☆13Oct 8, 2021Updated 4 years ago
- OpenZFS on Linux and FreeBSD☆18Apr 30, 2026Updated last week
- keylogger sends the login details by email, card number, facebook account,paypal...etc new projet 2020☆17Sep 21, 2020Updated 5 years ago
- SnappyPDF integration for OctoberCMS☆12Jun 21, 2022Updated 3 years ago
- ☆27May 27, 2018Updated 7 years ago
- In recent time there has been an increase of malicious Android applications showing up on both official and unofficial markets. If one ha…☆14Mar 28, 2014Updated 12 years ago