All Projects → Papers → Similar Projects or Alternatives

892 Open source projects that are alternatives of or similar to Papers

Documents
Documentation for Phase 4 Ground
Stars: ✭ 31 (-46.55%)
Mutual labels:  paper
Pytorchsr
Pytorch based phoneme recognition (TIMIT phoneme classification)
Stars: ✭ 21 (-63.79%)
Mutual labels:  paper
Arpspoof
arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (-31.03%)
Mutual labels:  hacking
Badusb botnet
👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-44.83%)
Mutual labels:  hacking
Drv3 Tools
(Not actively maintained, use DRV3-Sharp) Tools for extracting and re-injecting files for Danganronpa V3 for PC.
Stars: ✭ 13 (-77.59%)
Mutual labels:  hacking
Usb Keystroke Injector
☠️ An Arduino-based USB keyboard simulator which injects keystrokes via Bluetooth protocol or predefined payloads in a SD card.
Stars: ✭ 42 (-27.59%)
Mutual labels:  hacking
Tic Tac
Client not paid ? This is the solution of your problem
Stars: ✭ 29 (-50%)
Mutual labels:  hacking
Fullsubnet
PyTorch implementation of "A Full-Band and Sub-Band Fusion Model for Real-Time Single-Channel Speech Enhancement."
Stars: ✭ 51 (-12.07%)
Mutual labels:  paper
Broxy
An HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+1472.41%)
Mutual labels:  hacking
Swift Keylogger
Keylogger for mac written in Swift using HID
Stars: ✭ 995 (+1615.52%)
Mutual labels:  hacking
Paperless
Scan, index, and archive all of your paper documents
Stars: ✭ 7,662 (+13110.34%)
Mutual labels:  paper
Shuffle
WebShell Backdoor Framework
Stars: ✭ 11 (-81.03%)
Mutual labels:  hacking
Cfw2ofw Helper
Providing aid in converting video games.
Stars: ✭ 44 (-24.14%)
Mutual labels:  hacking
Fiercephish
FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
Stars: ✭ 960 (+1555.17%)
Mutual labels:  hacking
Slowloris
Asynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-12.07%)
Mutual labels:  hacking
Reverse Engineering
This repository contains some of the executables that I've cracked.
Stars: ✭ 29 (-50%)
Mutual labels:  hacking
Taketv
TakeTV permite descubrir dispositivos de red DLNA/UPnP y ayuda a reproducir archivos multimedia en los televisores inteligentes desde nuestra terminal en Linux.
Stars: ✭ 41 (-29.31%)
Mutual labels:  hacking
Infogan
Code for reproducing key results in the paper "InfoGAN: Interpretable Representation Learning by Information Maximizing Generative Adversarial Nets"
Stars: ✭ 948 (+1534.48%)
Mutual labels:  paper
Jaeles
The Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+1750%)
Mutual labels:  hacking
Taik
Tool hack Dark FB tanpa lisensi
Stars: ✭ 21 (-63.79%)
Mutual labels:  hacking
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+1610.34%)
Mutual labels:  hacking
Pythonhackingbook1
Python黑客编程之极速入门
Stars: ✭ 882 (+1420.69%)
Mutual labels:  hacking
Dockerscan
Docker security analysis & hacking tools
Stars: ✭ 1,046 (+1703.45%)
Mutual labels:  hacking
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+1400%)
Mutual labels:  hacking
Holisticinfosec For Webdevelopers Fascicle0
📚 Overview 🔒 Tooling 🔒 Process 🔒 Physical 🔒 People 📚
Stars: ✭ 37 (-36.21%)
Mutual labels:  hacking
100 Days Of Swiftui
👨‍💻👩‍💻100 Days Of SwiftUI free course from Hacking with Swift. 👨‍💻👩‍💻
Stars: ✭ 35 (-39.66%)
Mutual labels:  hacking
Dracnmap
Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+1384.48%)
Mutual labels:  hacking
Tweak Series
Repo for YouTube series
Stars: ✭ 44 (-24.14%)
Mutual labels:  hacking
Binary Hacking Course
📟Binary Hacking Course
Stars: ✭ 34 (-41.38%)
Mutual labels:  hacking
Shellshockhunter
It's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-10.34%)
Mutual labels:  hacking
Spytrojan keylogger
[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-44.83%)
Mutual labels:  hacking
Vulnx
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+1639.66%)
Mutual labels:  hacking
Essentials
The essential plugin suite for Minecraft servers.
Stars: ✭ 957 (+1550%)
Mutual labels:  paper
Whitehat
Information about my experiences on ethical hacking 💀
Stars: ✭ 54 (-6.9%)
Mutual labels:  hacking
Pxenum
A shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-48.28%)
Mutual labels:  hacking
Keylogger
A simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (+1636.21%)
Mutual labels:  hacking
Speedhack
Speedhack coded in C++, inspired by Cheat Engine's own speedhack.
Stars: ✭ 29 (-50%)
Mutual labels:  hacking
Pythem
pentest framework
Stars: ✭ 1,060 (+1727.59%)
Mutual labels:  hacking
Intranet penetration cheetsheets
做redteam时使用,修改自Ridter的https://github.com/Ridter/Intranet_Penetration_Tips
Stars: ✭ 29 (-50%)
Mutual labels:  hacking
Websocket Connection Smuggler
websocket-connection-smuggler
Stars: ✭ 40 (-31.03%)
Mutual labels:  hacking
Catchme
CatchME - WiFi Fun Box "Having Fun with ESP8266"
Stars: ✭ 28 (-51.72%)
Mutual labels:  hacking
Kill Router
Ferramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-1.72%)
Mutual labels:  hacking
Papers
Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)
Stars: ✭ 19 (-67.24%)
Mutual labels:  paper
Deepweb Scappering
Discover hidden deepweb pages
Stars: ✭ 40 (-31.03%)
Mutual labels:  hacking
Wssh
WSSH Is a tool for brute forcing servers that has port 22 open via ssh, wssh is probably the fastest ssh brute forcer available
Stars: ✭ 21 (-63.79%)
Mutual labels:  hacking
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+15384.48%)
Mutual labels:  hacking
Papercrawler
Crawler used to crawl papers
Stars: ✭ 20 (-65.52%)
Mutual labels:  paper
Reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+1579.31%)
Mutual labels:  hacking
Awesome Hacking
A curated list of awesome Hacking tutorials, tools and resources
Stars: ✭ 7,756 (+13272.41%)
Mutual labels:  hacking
Spellbook
Micro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-8.62%)
Mutual labels:  hacking
Wgan Lp Tensorflow
Reproduction code for WGAN-LP
Stars: ✭ 13 (-77.59%)
Mutual labels:  paper
Powerladon
Ladon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-32.76%)
Mutual labels:  hacking
Kubernetes Goat
Kubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Stars: ✭ 868 (+1396.55%)
Mutual labels:  hacking
Best Hacking Tools
BEST HACKING TOOLS..For more tools visit our blog for Hackers
Stars: ✭ 46 (-20.69%)
Mutual labels:  hacking
Neural Architecture Search With Rl
Minimal Tensorflow implementation of the paper "Neural Architecture Search With Reinforcement Learning" presented at ICLR 2017
Stars: ✭ 37 (-36.21%)
Mutual labels:  paper
Multiagent Particle Envs
Code for a multi-agent particle environment used in the paper "Multi-Agent Actor-Critic for Mixed Cooperative-Competitive Environments"
Stars: ✭ 1,086 (+1772.41%)
Mutual labels:  paper
Dll hook Rs
Rust code to show how hooking in rust with a dll works.
Stars: ✭ 57 (-1.72%)
Mutual labels:  hacking
Project Tauro
A Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-10.34%)
Mutual labels:  hacking
Style Transfer In Text
Paper List for Style Transfer in Text
Stars: ✭ 1,030 (+1675.86%)
Mutual labels:  paper
Brutex
Automatically brute force all services running on a target.
Stars: ✭ 974 (+1579.31%)
Mutual labels:  hacking
1-60 of 892 similar projects