Chat over External and Internal Network with password based encryption.
☆13Nov 15, 2021Updated 4 years ago
Alternatives and similar repositories for Encrypted-Python-Chat
Users that are interested in Encrypted-Python-Chat are comparing it to the libraries listed below
Sorting:
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- Sample code for locating Particle Photons on your local network for direct client-server communication☆11Aug 4, 2016Updated 9 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Download porn videos (Python)☆14Apr 12, 2018Updated 7 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- A simple shell executer script that kills processes that run for too long☆23Aug 7, 2012Updated 13 years ago
- GoLismero web fingerprint population tool☆19Jul 30, 2013Updated 12 years ago
- Runway Port of BigBiGAN from the paper "Large Scale Adversarial Representation Learning"☆10Dec 10, 2024Updated last year
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- Easy sandboxing for rust☆11Jun 19, 2016Updated 9 years ago
- const fn implementation of the SHA-2 family of hash functions☆17Oct 17, 2023Updated 2 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- Python based 32-bit Windows debugger built for learning purposes. Currently includes breakpoint setting, register modification, process m…☆13Jun 24, 2020Updated 5 years ago
- macOS/OSX hash dump script taken from Empire framework☆13Oct 19, 2018Updated 7 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- Browser agnostic extension that enables pasting into password fields...☆15Jan 12, 2020Updated 6 years ago
- Slides from "Betta hide yo downlinks (Building a budget friendly Az/El tracker)" presentation at Cyberspectrum #21☆14Aug 3, 2017Updated 8 years ago
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 6 years ago
- Automatically mute Hulu ads.☆13Nov 20, 2015Updated 10 years ago
- Parse and stringify mdns service types☆15Jul 16, 2017Updated 8 years ago
- ARP Exploitation in Python☆10Feb 19, 2017Updated 9 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- This package allows reading and writing bettercap's session recordings.☆14Apr 8, 2019Updated 6 years ago
- OSINT tool for Instagram☆15Feb 19, 2019Updated 7 years ago
- Exploits Wikipedia's daily view counts to find out what topics are current trends☆18May 7, 2013Updated 12 years ago
- Zeek package to detect Zerologon☆11Nov 10, 2021Updated 4 years ago
- ☆12May 13, 2020Updated 5 years ago
- Turn your car into a game controller with a cheap CANbus sniffer☆12Dec 18, 2017Updated 8 years ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- Watch Dogs texture converter☆18May 28, 2014Updated 11 years ago
- Small ESP32 PCB to drive LED Strips☆12Jul 2, 2019Updated 6 years ago
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- Upload external IP so you can find your devices elsewhere☆16Mar 25, 2024Updated last year
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago