Highlights
- Pro
Stars
5
results
for sponsorable starred repositories
written in Python
Clear filter
Turn (almost) any Python command line program into a full GUI application with one line
How to exploit a double free vulnerability in 2021. Use After Free for Dummies
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
A small daemon that ensures connectivity for single-PCB devices such as the Raspberry Pi where you don't always have the means to setup your network interfaces by hand