This is an example of using Flask to access Google APIs.
☆29May 21, 2013Updated 12 years ago
Alternatives and similar repositories for talent-curator
Users that are interested in talent-curator are comparing it to the libraries listed below
Sorting:
- Neural Signal Analysis☆14Jan 5, 2026Updated last month
- Materials for Structural geology 2 course☆11Nov 11, 2019Updated 6 years ago
- A datepicker for @twitter bootstrap; originally by Stefan Petre of eyecon.ro, improvements by @eternicode☆13Sep 9, 2012Updated 13 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Updated this week
- Aivika for .NET, simplified version☆10Nov 11, 2017Updated 8 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Play with dynamic voronoi cells.☆11Mar 1, 2020Updated 6 years ago
- extendable field for use in Django Models☆29May 7, 2023Updated 2 years ago
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- Original Joy☆11Dec 17, 2024Updated last year
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- ☆12Dec 9, 2019Updated 6 years ago
- Terraform code samples for use with AWS ECS☆10Oct 13, 2017Updated 8 years ago
- File storage abstraction layer for Python☆23Dec 10, 2015Updated 10 years ago
- this repo contains a number of checklists that we find very useful☆12Oct 14, 2018Updated 7 years ago
- Save as PDF addon for Firefox and Google Chrome☆15Jun 12, 2025Updated 8 months ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- Twitter stream and social network crawling tools☆17Nov 17, 2016Updated 9 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- A Type System Attempt for Wolfram Language☆13Feb 28, 2021Updated 5 years ago
- Python script to extract embedded data from binaries generated by SAPIEN Script Packager☆13Mar 20, 2024Updated last year
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- ☆11Apr 16, 2025Updated 10 months ago
- A Haskell implementation of Andrew Kensler's business card raytracer.☆18Oct 12, 2021Updated 4 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- DCPU-16 emulator written in Squeak/Smalltalk.☆10Jul 16, 2015Updated 10 years ago
- ☆12Aug 19, 2017Updated 8 years ago
- An attempt at writing a Lattice Boltzmann CFD simulator in Rust☆10Apr 29, 2019Updated 6 years ago
- A free antivirus aggregation software like VirusTotal.☆13Dec 3, 2019Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- iOS Audio Player/Downloader for VK.com 's audio library.☆12Jan 29, 2019Updated 7 years ago
- ☆12Aug 8, 2023Updated 2 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/windbgshark☆11Jul 1, 2015Updated 10 years ago
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago