peterharperuk / pico-examplesLinks
☆11Updated 4 months ago
Alternatives and similar repositories for pico-examples
Users that are interested in pico-examples are comparing it to the libraries listed below
Sorting:
- This project implements a cybersecurity system for detecting anomalies and intrusions in network traffic. It utilizes machine learning mo…☆15Updated last year
- hatsApp Message Sender is a simple Python application that allows users to send WhatsApp messages programmatically using the pywhatkit li…☆14Updated 2 years ago
- This is a free and open source project for sending random messages (sms bomber)☆11Updated last year
- Porting of Linux CAN-bus drivers to QNX☆12Updated last week
- solo2yolo is a tool that enables conversion of SOLO datasets to YOLO format from right within the Unity editor.☆11Updated last year
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Updated 7 months ago
- Get a number of your tweets from the Twitter API.☆13Updated 3 years ago
- Study Buddy is an AI assistant creation app that allows you to design and customize your personal assistant's personality to cater to you…☆11Updated 2 years ago
- This is a termux sms booming tool☆10Updated 2 years ago
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆13Updated 2 years ago
- Code snippets for Qiling Tutorials☆21Updated 5 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13Updated 8 years ago
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆18Updated 5 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Updated 3 years ago
- ☆3,696Updated 2 months ago
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆22Updated last year
- Unicode Security Toolkit☆21Updated last month
- cryptam document malware analysis tool☆12Updated 2 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16Updated 6 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago
- A FREE course that takes you step-by-step through building a custom Automation Ansible Framework from scratch.☆22Updated 2 months ago
- WiFi arsenal☆17Updated 5 years ago
- 🧠✈️ An ergo based project that relies on a convolutional neural network to detect airplanes from satellite imagery.☆45Updated 6 years ago
- A FREE comprehensive step-by-step embedded Assembler tutorial covering the basics including coding your own vector table and linker scrip…☆43Updated 2 months ago
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆46Updated 7 months ago
- 🔵 ethereum grid trading bot☆36Updated 4 months ago
- A tool designed for penetration testers to perform attacks on LAN and WLAN networks, including network discovery, exploitation, and NAC b…☆44Updated 6 months ago
- ☆10Updated 2 years ago
- LOJAX ROOTKIT (UEFI) +PDF Included[x]☆36Updated 2 years ago
- Official implementation for the paper "On deceiving malware classification with section injection"☆36Updated 3 years ago