The first Post-Quantum transitory cryptocurrency
☆22Apr 23, 2026Updated last week
Alternatives and similar repositories for Network
Users that are interested in Network are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android App - RemoteCodeExecution☆14Aug 20, 2013Updated 12 years ago
- Root app for Motorola devices to backup, restore, or flash new .ISO images into the 'CD-ROM' partition.☆10Aug 25, 2017Updated 8 years ago
- Clone an Android Virtual Device for easy distribution through the Android SDK Manager.☆16Jul 9, 2012Updated 13 years ago
- Awesome BLE Hack repository☆13Apr 7, 2019Updated 7 years ago
- Allows: read firmware via BLE, restore and patch the original firmware, ...☆12Aug 30, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Conscrypt Provider app, which can be included from other applications (WIP)☆18Nov 8, 2022Updated 3 years ago
- Universal Radio Hacker (urh) plugin to decode eQ-3/ELV/Technoline ETH Comfort/SDLC/HDLC messages☆14Jan 17, 2019Updated 7 years ago
- Detect root CA certificates from the operating system☆15Nov 24, 2025Updated 5 months ago
- Includes Kernel-mode driver source and usermode control application that sends requests to the hijacked device control, enjoy. Released t…☆12Oct 30, 2020Updated 5 years ago
- python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms …☆11Feb 15, 2017Updated 9 years ago
- Takes a 10 digit Indian cell phone number and displays the Operator name and the location of that number☆14Aug 21, 2015Updated 10 years ago
- git clone https://github.com/Zuccs/PhoneSploit☆13Oct 17, 2019Updated 6 years ago
- ☆20May 21, 2025Updated 11 months ago
- A remote library to config variables, appearance and behavior of your app without publishing an app update☆17Nov 30, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PS scripts for checking your certificate store, and code-signing status of executables.☆17Nov 25, 2015Updated 10 years ago
- Tool to Spoof SMS from ANY number or shortcode!☆16Nov 21, 2022Updated 3 years ago
- ☆12Oct 28, 2022Updated 3 years ago
- Simple Python scripts to listen, log and forward network traffic☆17Dec 4, 2024Updated last year
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆21Aug 17, 2022Updated 3 years ago
- ☆60Feb 14, 2019Updated 7 years ago
- Utilities for system wide CA certificate installation☆27Apr 20, 2026Updated 2 weeks ago
- ☆11Mar 19, 2019Updated 7 years ago
- A Matrix client for Crystal☆12Dec 6, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆10Oct 28, 2016Updated 9 years ago
- Fb & Gmail☆16Jun 3, 2021Updated 4 years ago
- Various extensions for midori☆11Dec 26, 2020Updated 5 years ago
- Raspberry Pi Robot - Android Remote Control (Bluetooth)☆14May 29, 2017Updated 8 years ago
- Event Kernel for Ruby☆11Dec 26, 2020Updated 5 years ago
- (Node Distribution) A carefully curated collection of Root Certificates for validating the trustworthiness of SSL certificates while veri…☆43Dec 17, 2018Updated 7 years ago
- A Cloud Native Buildpack that adds custom CA certificates to a build and a created image☆28Apr 27, 2026Updated last week
- Elixir Shanghai meetup☆10Feb 16, 2018Updated 8 years ago
- ☆11Jun 3, 2025Updated 11 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- ⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan☆25Jun 16, 2018Updated 7 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- A Multi-Threaded Node.JS Miner for DuinoCoin☆20Apr 14, 2022Updated 4 years ago
- fanotify cron system☆21Sep 15, 2015Updated 10 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago