Build gen AI apps with an all-in-one modern database: MongoDB Atlas
MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
Start Free
Simply solve complex auth. Easy for devs to set up. Easy for non-devs to use.
Transform user access with Frontegg CIAM: login box, SSO, MFA, multi-tenancy, and 99.99% uptime.
Custom auth drains 25% of dev time and risks 62% more breaches, stalling enterprise deals. Frontegg platform delivers a simple login box, seamless authentication (SSO, MFA, passwordless), robust multi-tenancy, and a customizable Admin Portal. Integrate fast with the React SDK, meet compliance needs, and focus on innovation.
Python Based Brute Force Password Cracking Assistant By Clownsec
A python script used to generate all possible password combinations for cracking WAP and other logins or password files.
This program is open source. If you see the need to repair or change something by all means do so, but share your findings. *HONK*
Usage: wordpie.py [-h] [-o OUTPUT] [-min MIN_SIZE] [-max MAX_SIZE] [-N] [-L] [-U] [-S] [-A] [-v]
Generate a wordlist with all possible combinations of letters including:
-L (Lowercase Letters)
-U (Uppercase Letters)
-N (Numbers...
Visual Cryptography and Bit-Plane Complexity Segmentation in Python
Hide secret messages in your pictures!
Cyberbit lets you transmit a secret message to an intended person in a new manner.
The secret message is an 1-bit deep black & white image. The message can contain
written text, a drawing, a secret code etc. Using Visual Cryptography the
application splits the secret message into two "shadow images" called <<shares>>.
Any of the two shares will be embedded into a "normal" image file called by tradition
<<vessel>>. You can use a method of hand to...
CryptoPy is a pure python implmentation of cryptographic algorithms and applications. The algorithms are developed for readability more than speed. The collection now includes IEEE 802.11i specific algorithms that generated the test vectors for 802.11i.