Springer Link Download Module for Python
☆20Mar 6, 2023Updated 3 years ago
Alternatives and similar repositories for pupalink
Users that are interested in pupalink are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Powershell Script to Harden IIS SSL and TLS☆31Mar 17, 2026Updated last month
- A collection of awesome penetration testing resources, tools and other shiny things☆12Oct 10, 2017Updated 8 years ago
- Create visualization from Shodan query☆74May 25, 2021Updated 4 years ago
- Domain Engineer or Domaineer is Semi-Auto Bot to gaining data from domains☆12Sep 25, 2025Updated 6 months ago
- Useful Pentest tool links☆12Aug 13, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Create tables in Google BigQuery, auto-generate their schemas, and retrieve said schemas.☆10Apr 10, 2026Updated last week
- Bypass Windows defender syscall☆18Jul 17, 2021Updated 4 years ago
- ☆22Mar 5, 2018Updated 8 years ago
- A pre-DDoS security assessment tool☆119Jun 11, 2021Updated 4 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Jun 14, 2021Updated 4 years ago
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆11Dec 23, 2019Updated 6 years ago
- Android based vote verification application for Estonian I-voting system☆19Oct 3, 2025Updated 6 months ago
- A Telegram cleaning python script☆12Jul 15, 2021Updated 4 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆31Mar 30, 2020Updated 6 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- eLearnSecurity Certified Exploit Development☆105Jul 25, 2021Updated 4 years ago
- SPI MITM for the Arty S7-50☆14Dec 24, 2022Updated 3 years ago
- Inter-Process Communication Mechanisms☆28Aug 28, 2020Updated 5 years ago
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆14Sep 4, 2024Updated last year
- ☆44Mar 18, 2026Updated last month
- Used to grab banners from TCP services and search their contents for a specific string.☆16Feb 11, 2020Updated 6 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆15Oct 27, 2022Updated 3 years ago
- free and open source podcast publishing system☆22Sep 30, 2022Updated 3 years ago
- Regular expression Search on the command-line☆16Mar 31, 2025Updated last year
- D-RAT [VB.NET]+[MySQL]+[PHP]☆15Jun 10, 2020Updated 5 years ago
- My Payload Collection (XSS,SQL ...)☆14Jul 17, 2018Updated 7 years ago
- Simple tool to scanning sql injection vulnerability, easy to use!!☆14Oct 21, 2019Updated 6 years ago
- A collection of awesome penetration testing resources☆13Jan 13, 2019Updated 7 years ago
- ☆39Aug 8, 2021Updated 4 years ago
- An AVX Lifter for the Hex-Rays Decompiler + new instructions☆11Oct 14, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Trigger-only for CVE-2021-29627☆13Apr 12, 2021Updated 5 years ago
- A custom context for eyre that supports backtraces on stable☆15Mar 19, 2024Updated 2 years ago
- Repo of cheatsheets I have been building during my hacking adventures!☆22May 3, 2025Updated 11 months ago
- A collection of my scripts for research☆12Jul 28, 2025Updated 8 months ago
- Simulating Adversary Operations☆98Apr 13, 2018Updated 8 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- Linux kernel level keylogger that uses Twitter as a covert channel to get information of keystrokes and user data into the attacker using…☆11Jan 20, 2023Updated 3 years ago