veggiedefender / pyc-secret-labLinks
☆65Updated 5 years ago
Alternatives and similar repositories for pyc-secret-lab
Users that are interested in pyc-secret-lab are comparing it to the libraries listed below
Sorting:
- ☆93Updated 2 years ago
- Code execution via Python package installation.☆171Updated 6 years ago
- Small Python library that makes it easy to exploit race conditions in web apps with Requests.☆161Updated 2 years ago
- scrapped ideas and garbage code☆13Updated 4 years ago
- Let's brute force this hotel's tv.☆81Updated 5 years ago
- Create complex tools execution Workflows for working together☆22Updated 4 years ago
- Binary file entropy visualizer written in Python☆54Updated 6 months ago
- An SSRF-preventing wrapper around Python's requests library. Advocate is no longer maintained, please fork and rename if you would like t…☆95Updated last year
- ☆30Updated 4 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆109Updated 5 years ago
- Generate graphs with NetworkX, natively visualize with D3.js and pywebview☆70Updated 4 years ago
- Homoglyphs: get similar letters, convert to ASCII, detect possible languages and UTF-8 group.☆82Updated 4 years ago
- A Python implementation of our efficient Bloom filter library.☆29Updated 5 years ago
- An enchanting 🔮 web screenshot tool for capturing and sharing web content effortlessly☆33Updated 2 months ago
- The Swiss Army knife for backend engineers.☆97Updated 4 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- Grep Web pages with extra features like JS deobfuscation and OCR☆110Updated last year
- unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives☆97Updated 6 years ago
- A modern code-injection framework for Python. Like Pyrasite but Kubernetes-aware.☆66Updated 3 months ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Updated 8 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆49Updated 3 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 5 years ago
- The tools used for the DNS spies blog post☆48Updated 7 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 6 years ago
- An experimental file formats playground☆87Updated 2 years ago
- Source to www.draw.io☆99Updated 6 years ago
- A Passive SSH back-end and scanner.☆103Updated last month
- A medium interaction printer honeypot 🍯☆202Updated 2 years ago
- Detect silent (unwanted) changes to files on your system☆162Updated 5 years ago