peterharperuk / pico-examplesLinks
☆12Updated 2 months ago
Alternatives and similar repositories for pico-examples
Users that are interested in pico-examples are comparing it to the libraries listed below
Sorting:
- Porting of Linux CAN-bus drivers to QNX☆11Updated 2 weeks ago
- This project implements a cybersecurity system for detecting anomalies and intrusions in network traffic. It utilizes machine learning mo…☆16Updated last year
- Assembler tinkering happens here. All your bytes are belong to us.☆13Updated 8 years ago
- Hardware & computer guide for AI: how to choose & build a computer. This guide is intended for beginers in hardware, in order to plan wh…☆11Updated 3 years ago
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Updated 5 months ago
- This package allows reading and writing bettercap's session recordings.☆15Updated 6 years ago
- Offensive Linux tool for network attacks. Built from the ground with only C.☆14Updated 4 years ago
- ☆11Updated 2 years ago
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Updated last year
- Get a number of your tweets from the Twitter API.☆10Updated 3 years ago
- solo2yolo is a tool that enables conversion of SOLO datasets to YOLO format from right within the Unity editor.☆12Updated last year
- An accurated list of things to test while pentesting☆11Updated 4 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- A simple wrapper for l2ping which shows rssi☆19Updated 5 years ago
- Applying PyTorch MiDaS model on live CV capture☆10Updated last year
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- Polite, slim and concurrent web crawler.☆14Updated 5 years ago
- ☆18Updated 2 years ago
- A simple tool to boost your image data with simple, size-safe augmentations☆21Updated 5 months ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆13Updated 3 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆16Updated 2 months ago
- Scraping LegiFrance naturalisation decrees for fun and OSINT profit☆11Updated 2 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11Updated last year
- The best way to send emails in Go.☆12Updated 4 years ago
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆27Updated 4 years ago
- Rubber Ducky powered by NeoKey☆28Updated last year
- CVE-2025-61884☆24Updated last month
- A Maltego transforms collection for Twint☆32Updated 5 years ago