veggiedefender / pyc-secret-labLinks
☆65Updated 5 years ago
Alternatives and similar repositories for pyc-secret-lab
Users that are interested in pyc-secret-lab are comparing it to the libraries listed below
Sorting:
- ☆93Updated 2 years ago
- Code execution via Python package installation.☆170Updated 6 years ago
- Small Python library that makes it easy to exploit race conditions in web apps with Requests.☆160Updated 2 years ago
- Binary file entropy visualizer written in Python☆54Updated 5 months ago
- A Python implementation of our efficient Bloom filter library.☆29Updated 5 years ago
- coverage guided fuzz testing for python☆225Updated 5 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- scrapped ideas and garbage code☆13Updated 4 years ago
- Script to remove homoglyphs and zero-width characters to allow for safe distribution of documents from anonymous sources.☆137Updated 6 years ago
- A medium interaction printer honeypot 🍯☆202Updated 2 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆49Updated 3 years ago
- Breaks the encryption and obfuscation layers that Dropbox applies to their modified Python interpreter.☆87Updated 5 years ago
- Run a personal VPN in the cloud. And rotate it regularly.☆146Updated last year
- Official python API for Phish.AI public and private API to detect zero-day phishing websites☆174Updated 7 years ago
- unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives☆97Updated 6 years ago
- Generate graphs with NetworkX, natively visualize with D3.js and pywebview☆70Updated 4 years ago
- An SSRF-preventing wrapper around Python's requests library. Advocate is no longer maintained, please fork and rename if you would like t…☆95Updated last year
- Detect silent (unwanted) changes to files on your system☆162Updated 5 years ago
- A modern code-injection framework for Python. Like Pyrasite but Kubernetes-aware.☆65Updated 2 months ago
- The Swiss Army knife for backend engineers.☆97Updated 4 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Let's brute force this hotel's tv.☆80Updated 5 years ago
- An interactive command-line deauther for macOS.☆73Updated 6 years ago
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆130Updated 2 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆109Updated 5 years ago
- CERT Tapioca for MITM network analysis☆183Updated last year
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆85Updated 4 years ago
- Scan pypi for typosquatting☆37Updated 2 years ago
- IPv6Tools is a robust modular framework that enables the ability to visually audit an IPv6 enabled network.☆127Updated 7 years ago