☆70Nov 30, 2013Updated 12 years ago
Alternatives and similar repositories for python
Users that are interested in python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Jul 2, 2021Updated 4 years ago
- Properly Engineered Infection Kit, A framework for creating malware in C#. Multi-threaded, comes with a built-in MSIL obfuscator and pack…☆15Jun 30, 2011Updated 14 years ago
- crack zip file password using brute force attack with python containig 3.5 lakh trending passlist☆19Apr 4, 2024Updated last year
- ☆26Sep 1, 2017Updated 8 years ago
- Create and Deploy a Front Run Bot Sol Contract on BSC FLASHBOT☆11Mar 19, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆13Feb 14, 2026Updated last month
- A GUI for the Ducky Encoder☆22Mar 9, 2019Updated 7 years ago
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- Summerize documents usinng fuzzy logic in Natural language processing☆12Jan 31, 2026Updated last month
- LLM-Powered Code Security Scanning☆21Apr 2, 2025Updated 11 months ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- A curated list of websites for all things android dev☆12Aug 11, 2017Updated 8 years ago
- Fork of http://godoc.org/code.google.com/p/gopacket☆14Jul 23, 2020Updated 5 years ago
- Ruby ARP Toolkit☆14Apr 15, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Read & write magnetic card data to magspoof (ATtiny85)☆12May 27, 2019Updated 6 years ago
- RuneScape Development Kit☆20Jun 18, 2011Updated 14 years ago
- ☆16Updated this week
- ATM Configurator aka Tyupkin trojan☆12Mar 23, 2015Updated 11 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- Unified repository for different Metasploit Framework payloads☆22Oct 25, 2017Updated 8 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- The BornHack 2017 Badge☆10Aug 4, 2018Updated 7 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆12Oct 12, 2013Updated 12 years ago
- Function ID for Malware Analysis☆13Jul 6, 2020Updated 5 years ago
- Hands-On Penetration Testing on Windows, published by Packt☆27Jan 18, 2023Updated 3 years ago
- Zello PTT Hack to USB to Serial converter☆13Jan 14, 2020Updated 6 years ago
- Nexus of Android banking Trojans☆15Oct 11, 2023Updated 2 years ago
- Bunch of Scripts that I write and sometimes maintain☆12Jun 25, 2021Updated 4 years ago
- A toolkit to get you started with organizing your own hack week!☆12Feb 4, 2022Updated 4 years ago
- An API connector for the Office 365 Management API and the Elastic Stack☆20Aug 9, 2018Updated 7 years ago
- General tools and scripts i want to make public to the world.☆46Apr 14, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Mar 20, 2019Updated 7 years ago
- This is a project that can bypass the android hidden api restictrion and bypass dlfcn restriction for system lib.☆26Mar 7, 2022Updated 4 years ago
- Training Multiple agents in the same environment to collaborate and compete with each other☆12Dec 1, 2019Updated 6 years ago
- ☆18Oct 2, 2018Updated 7 years ago
- ☆22Mar 4, 2025Updated last year
- A tool to test penetration into personal systems (current version is beta)☆37Sep 10, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/auto-reaver☆13Mar 22, 2015Updated 11 years ago