repo_full_name stringlengths 6 93 | repo_url stringlengths 25 112 | repo_api_url stringclasses 28
values | owner stringclasses 28
values | repo_name stringclasses 28
values | description stringclasses 28
values | stars int64 617 98.8k | forks int64 31 355 ⌀ | watchers int64 990 999 ⌀ | license stringclasses 2
values | default_branch stringclasses 2
values | repo_created_at timestamp[s]date 2012-07-24 23:12:50 2025-06-16 08:07:28 ⌀ | repo_updated_at timestamp[s]date 2026-02-23 15:23:15 2026-05-03 18:52:12 ⌀ | repo_topics listlengths 0 13 ⌀ | repo_languages unknown | is_fork bool 1
class | open_issues int64 3 104 ⌀ | file_path stringlengths 3 208 | file_name stringclasses 509
values | file_extension stringclasses 1
value | file_size_bytes int64 101 84k ⌀ | file_url stringclasses 627
values | file_raw_url stringclasses 627
values | file_sha stringclasses 624
values | language stringclasses 8
values | parsed_at stringdate 2026-05-04 01:12:36 2026-05-04 19:41:55 | text stringlengths 100 102k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
owocki/pytrader | https://github.com/owocki/pytrader | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | history/migrations/0004_socialnetworkmention.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:09.485525 | # -*- coding: utf-8 -*-
from __future__ import unicode_literals
from django.db import models, migrations
import history.models
class Migration(migrations.Migration):
dependencies = [
('history', '0003_auto_20160330_1920'),
]
operations = [
migrations.CreateModel(
name='Socia... |
owocki/pytrader | https://github.com/owocki/pytrader | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | history/migrations/0008_auto_20160416_1920.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:09.486425 | # -*- coding: utf-8 -*-
from __future__ import unicode_literals
from django.db import models, migrations
class Migration(migrations.Migration):
dependencies = [
('history', '0007_socialnetworkmention_sentiment_polarity'),
]
operations = [
migrations.AddField(
model_name='soc... |
owocki/pytrader | https://github.com/owocki/pytrader | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | history/migrations/0006_auto_20160416_1305.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:09.515851 | # -*- coding: utf-8 -*-
from __future__ import unicode_literals
from django.db import models, migrations
class Migration(migrations.Migration):
dependencies = [
('history', '0005_socialnetworkmention_network_created_on'),
]
operations = [
migrations.AlterField(
model_name='s... |
owocki/pytrader | https://github.com/owocki/pytrader | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | history/migrations/0009_auto_20160417_1332.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:09.516373 | # -*- coding: utf-8 -*-
from __future__ import unicode_literals
from django.db import models, migrations
class Migration(migrations.Migration):
dependencies = [
('history', '0008_auto_20160416_1920'),
]
operations = [
migrations.AlterField(
model_name='socialnetworkmention',... |
owocki/pytrader | https://github.com/owocki/pytrader | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | history/models.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:09.632349 | from __future__ import unicode_literals
from django.utils import timezone
import datetime
from pybrain.datasets import SupervisedDataSet
from pybrain.tools.shortcuts import buildNetwork
from pybrain.supervised.trainers import BackpropTrainer
from django.db import models
from history.tools import create_sample_row, get_... |
owocki/pytrader | https://github.com/owocki/pytrader | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | history/technical_indicators.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:10.463816 | # from https://github.com/matplotlib/matplotlib/blob/master/examples/pylab_examples/finance_work2.py
# SEE ALSO LISCENSE_MATPLOTLIB
import numpy as np
import pandas as pd
def moving_average(x, n, type='simple'):
"""
compute an n period moving average.
type is 'simple' | 'exponential'
"""
x = np... |
owocki/pytrader | https://github.com/owocki/pytrader | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | history/predict.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:10.465116 | from history.tools import create_sample_row
from history.models import PredictionTest
import time
from history.tools import print_and_log
def predict_v2(ticker, hidden_layers=15, NUM_MINUTES_BACK=1000, NUM_EPOCHS=1000, granularity_minutes=15,
datasetinputs=5, learningrate=0.005, bias=False, momentum=0.... |
owocki/pytrader | https://github.com/owocki/pytrader | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | history/views.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:10.649684 | from django.contrib.admin.views.decorators import staff_member_required
from history.models import (
PredictionTest, Price, Trade, Balance, TradeRecommendation, get_time, PerformanceComp,
ClassifierTest)
from django.shortcuts import render_to_response
from django.utils import timezone
import datetime
from djang... |
owocki/pytrader | https://github.com/owocki/pytrader | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | history/poloniex.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:10.679268 | import urllib
import urllib2
import json
import time
import hmac
import hashlib
def createTimeStamp(datestr, format="%Y-%m-%d %H:%M:%S"):
return time.mktime(time.strptime(datestr, format))
class poloniex:
def __init__(self, APIKey, Secret):
self.APIKey = APIKey
self.Secret = Secret
def ... |
owocki/pytrader | https://github.com/owocki/pytrader | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | manage.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:10.761938 | #!/usr/bin/env python
import os
import sys
if __name__ == "__main__":
os.environ.setdefault("DJANGO_SETTINGS_MODULE", "pypolo.settings")
from django.core.management import execute_from_command_line
execute_from_command_line(sys.argv)
|
owocki/pytrader | https://github.com/owocki/pytrader | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | pypolo/wsgi.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:11.038094 | """
WSGI config for pypolo project.
It exposes the WSGI callable as a module-level variable named ``application``.
For more information on this file, see
https://docs.djangoproject.com/en/1.9/howto/deployment/wsgi/
"""
import os
from django.core.wsgi import get_wsgi_application
os.environ.setdefault("DJANGO_SETTIN... |
owocki/pytrader | https://github.com/owocki/pytrader | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | pypolo/urls.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:11.038596 | """pypolo URL Configuration
The `urlpatterns` list routes URLs to views. For more information please see:
https://docs.djangoproject.com/en/1.9/topics/http/urls/
Examples:
Function views
1. Add an import: from my_app import views
2. Add a URL to urlpatterns: url(r'^$', views.home, name='home')
Class-base... |
owocki/pytrader | https://github.com/owocki/pytrader | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | history/tools.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:11.305285 | import time
import datetime
from django.conf import settings
from django.core.exceptions import ImproperlyConfigured
def print_and_log(log_string):
with open(settings.LOG_FILE, "a") as myfile:
myfile.write(log_string + "\n")
print(log_string)
def get_utc_unixtime():
import time
import dateti... |
laurentS/slowapi | https://github.com/laurentS/slowapi | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | slowapi/wrappers.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:17.456264 | import inspect
from typing import Callable, Iterator, List, Optional, Union
from limits import RateLimitItem, parse_many # type: ignore
from starlette.requests import Request
class Limit(object):
"""
simple wrapper to encapsulate limits and their context
"""
def __init__(
self,
limi... |
laurentS/slowapi | https://github.com/laurentS/slowapi | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | slowapi/util.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:17.460571 | from starlette.requests import Request
def get_ipaddr(request: Request) -> str:
"""
Returns the ip address for the current request (or 127.0.0.1 if none found)
based on the X-Forwarded-For headers.
Note that a more robust method for determining IP address of the client is
provided by uvicorn's ... |
laurentS/slowapi | https://github.com/laurentS/slowapi | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | tests/__init__.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:17.464412 | import asyncio
import logging
import pytest
from fastapi import FastAPI
from mock import mock # type: ignore
from starlette.applications import Starlette
from starlette.requests import Request
from slowapi.errors import RateLimitExceeded
from slowapi.extension import Limiter, _rate_limit_exceeded_handler
from slowap... |
laurentS/slowapi | https://github.com/laurentS/slowapi | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | slowapi/errors.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:17.469385 | """
errors and exceptions
"""
from starlette.exceptions import HTTPException
from .wrappers import Limit
class RateLimitExceeded(HTTPException):
"""
exception raised when a rate limit is hit.
"""
limit = None
def __init__(self, limit: Limit) -> None:
self.limit = limit
if limit... |
laurentS/slowapi | https://github.com/laurentS/slowapi | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | slowapi/extension.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:17.472588 | """
The starlette extension to rate-limit requests
"""
import asyncio
import functools
import inspect
import itertools
import logging
import os
import time
from datetime import datetime
from email.utils import formatdate, parsedate_to_datetime
from functools import wraps
from typing import (
Any,
Callable,
... |
laurentS/slowapi | https://github.com/laurentS/slowapi | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | tests/test_fastapi_extension.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:17.477188 | import hiro # type: ignore
import pytest # type: ignore
from starlette.requests import Request
from starlette.responses import PlainTextResponse, Response
from starlette.testclient import TestClient
from slowapi.util import get_ipaddr
from tests import TestSlowapi
class TestDecorators(TestSlowapi):
def test_si... |
laurentS/slowapi | https://github.com/laurentS/slowapi | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | slowapi/__init__.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:17.479893 | from .extension import Limiter, _rate_limit_exceeded_handler
__all__ = ["Limiter", "_rate_limit_exceeded_handler"]
|
laurentS/slowapi | https://github.com/laurentS/slowapi | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | slowapi/middleware.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:17.482013 | import inspect
from typing import Callable, Iterable, Optional, Tuple
from starlette.applications import Starlette
from starlette.datastructures import MutableHeaders
from starlette.middleware.base import (
BaseHTTPMiddleware,
RequestResponseEndpoint,
)
from starlette.requests import Request
from starlette.res... |
laurentS/slowapi | https://github.com/laurentS/slowapi | null | null | null | null | 1,961 | null | null | mit | null | null | null | null | null | null | null | tests/test_starlette_extension.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:17.489385 | import time
import hiro # type: ignore
import pytest # type: ignore
from starlette.requests import Request
from starlette.responses import PlainTextResponse
from starlette.testclient import TestClient
from slowapi.util import get_ipaddr, get_remote_address
from tests import TestSlowapi
class TestDecorators(TestSl... |
VermiIIi0n/fuckZHS | https://github.com/VermiIIi0n/fuckZHS | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | utils.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:20.402286 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
import io
import os
import sys
from requests.cookies import RequestsCookieJar, create_cookie
from PIL import Image, ImageOps
from datetime import timedelta
def HMS(*args, **kw):
return str(timedelta(*args, **kw))
def strToClass(class_name: str, module: str="__main__... |
VermiIIi0n/fuckZHS | https://github.com/VermiIIi0n/fuckZHS | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | main.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:20.410129 | import os
import re
import json
import argparse
import requests
import platform
from functools import partial
from contextlib import suppress
from fucker import Fucker
from logger import logger
from ObjDict import ObjDict
from utils import showImage, cookie_jar_to_list
from utils import getConfigPath, getRealPath, vers... |
VermiIIi0n/fuckZHS | https://github.com/VermiIIi0n/fuckZHS | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | decrypt/main.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:20.411696 | import re
#from decrypt_hike import decrypt
from decrypt_api import decrypt
with open("./level0.js") as f:
content = f.read()
def escape(s:str):
return s.replace("\\", "\\\\").replace("\"", "\\\"").replace("\n", "\\n")
arg_re = re.compile("[\"\'](.*?)[\"\']")
cnt = 0
## dealing with hike's obfuscation
#func... |
VermiIIi0n/fuckZHS | https://github.com/VermiIIi0n/fuckZHS | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | ObjDict.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:20.422964 | # -*- coding: utf-8 -*-
from __future__ import annotations
from typing import Dict, Any, Optional
from copy import deepcopy
class ObjDict(dict):
@property
def NotExist(self): # for default value
return ObjDict.NotExist
def __init__(self, d: dict = None, recursive=True, default=NotExist, *, anti... |
VermiIIi0n/fuckZHS | https://github.com/VermiIIi0n/fuckZHS | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | logger.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:20.434334 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
import logging
import os
from utils import getRealPath
class MonoLogger:
_logger_map = {}
def __init__(self, name: str = "root", level: str | int = "WARNING", path: str = None,
formatter: logging.Formatter | str = None, to_console: bool = True):
... |
VermiIIi0n/fuckZHS | https://github.com/VermiIIi0n/fuckZHS | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | sign.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:20.436226 | from hashlib import md5
from ObjDict import ObjDict
SALT = "o6xpt3b#Qy$Z"
def sign(p:dict):
p = ObjDict(p)
raw = SALT + p.uuid + p.courseId + p.fileId + p.studyTotalTime + \
p.startDate + p.endDate + p.endWatchTime + p.startWatchTime + p.uuid
return md5(raw.encode()).hexdigest()
|
VermiIIi0n/fuckZHS | https://github.com/VermiIIi0n/fuckZHS | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | zd_utils.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:20.454295 | from Crypto.Cipher import AES
from base64 import b64encode, b64decode
from ObjDict import ObjDict
import json
IV = b"1g3qqdh4jvbskb9x"
HOME_KEY = b"7q9oko0vqb3la20r"
AI_KEY=b"hw2fdlwcj4cs1mx7"
VIDEO_KEY = b"azp53h0kft7qi78q"
QA_KEY = b"kcGOlISPkYKRksSK"
EXAM_KEY = b"onbfhdyvz8x7otrp"
class Cipher:
def __ini... |
VermiIIi0n/fuckZHS | https://github.com/VermiIIi0n/fuckZHS | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | push.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:20.469329 | '''
Author: Vincent Young, jiajiu123
Date: 2023-03-30 00:15:22
LastEditors: Vincent Young
LastEditTime: 2023-03-30 02:40:33
FilePath: /fuckZHS/push.py
Telegram: https://t.me/missuo(Vincent Young)
Copyright © 2023 by Vincent, All Rights Reserved.
'''
import requests
def pushpluser(title: str, content, tok... |
VermiIIi0n/fuckZHS | https://github.com/VermiIIi0n/fuckZHS | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | decrypt/decrypt_hike.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:20.475482 | table = ['Ym/DsFLDti4fwqJeCcKK', 'GsKLw4/Dj2APa1EiwrnCunzCucOQwrULQMO2Oww8FCI=', 'fsOXwonChQ==', 'dxhMOMO7Bg==', 'wonCiMKy', 'wrLCs30=', 'wq/CpGNPQcKc', 'wpzDmsOn', 'QGnCtAHDp8KYwpM=', 'wqHCrMKTACA=', 'wp7CgU/Ch8K3', 'ADTDssOLwqE=', 'wrDDncO6wqHDpQ==', 'wo9qwo1oQQ==', 'wpzDm8O0woLDoA==', 'eyVYFcO3', 'w5DDsMKBwqIB', 'w7... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | memory/audit_log.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:25.630949 | """
Audit log — tracks every outbound request made during autopilot sessions.
Append-only JSONL file at hunt-memory/audit.jsonl.
Used for post-session review and scope compliance verification.
"""
import fcntl
import json
import os
import sys
import time
from pathlib import Path
from memory.rotation import DEFAULT_K... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tests/conftest.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:25.649857 | """Shared fixtures for hunt memory and scope checker tests."""
import json
import os
import sys
import pytest
# Add tools/ to path so tests can import scope_checker, intel_engine, etc.
sys.path.insert(0, os.path.join(os.path.dirname(__file__), "..", "tools"))
from memory.schemas import CURRENT_SCHEMA_VERSION
@pyte... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | memory/pattern_db.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:25.662210 | """
Pattern database — successful techniques indexed by vuln class + tech stack.
Patterns are stored in a JSONL file, one entry per line.
Matching supports partial tech stack overlap for cross-target learning.
"""
import fcntl
import json
import os
import sys
from pathlib import Path
from memory.rotation import DEFA... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | memory/schemas.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:25.664833 | """
Schema validation for hunt memory JSONL entries.
All entries carry schema_version for future migration support.
Validation is strict on required fields, permissive on optional ones.
"""
from datetime import datetime, timezone
CURRENT_SCHEMA_VERSION = 1
# Required fields for each entry type
JOURNAL_REQUIRED = {"... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | scripts/dork_runner.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:25.667465 | #!/usr/bin/env python3
"""
dork_runner.py — Google Dork Automation Script
Author: Shuvonsec (@shuvonsec)
Usage: python3 dork_runner.py -d target.com [-c category] [-o output.txt]
"""
import argparse
import time
import sys
import json
import random
import urllib.parse
from datetime import datetime
# ── Colors ────────... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | memory/__init__.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:25.671739 | """
Hunt memory system — persistent journal, pattern database, and schema validation.
Runtime data stored at ~/.claude/projects/{project}/hunt-memory/
This package contains the code (read/write/validate), not the data.
"""
from memory.schemas import (
validate_journal_entry,
validate_target_profile,
valid... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | mcp/hackerone-mcp/server.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:25.674076 | #!/usr/bin/env python3
"""
HackerOne MCP Server — public endpoints only (no auth required).
Provides three tools:
- search_disclosed_reports: Search Hacktivity for disclosed reports
- get_program_stats: Bounty ranges, response times, resolved counts
- get_program_policy: Safe harbor, response SLA, excluded vuln ... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | memory/rotation.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:25.678992 | """
Size-based JSONL rotation for hunt memory files.
Append-only logs (audit.jsonl, patterns.jsonl, journal.jsonl) grow without bound
on active hunters. This module rotates them at a configurable size cap, keeping
N backups (file.1, file.2, ...) and dropping the oldest.
Rotation is performed under fcntl.LOCK_EX to be... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | agent.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:25.720362 | #!/usr/bin/env python3
"""
agent.py — LangGraph-style ReAct hunting agent for bug bounty automation.
Architecture
────────────
Primary: Real LangGraph + langchain-ollama (pip install langgraph langchain-ollama)
Fallback: Built-in ReAct loop using Ollama native tool calling (works out of the box)
Both paths expose ... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | brain.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:25.728881 | #!/usr/bin/env python3
from __future__ import annotations
"""
Brain — Multi-Provider LLM Reasoning Layer for Bug Bounty & VAPT
Supports: Ollama (local), Claude API, OpenAI, Grok (xAI)
Provider selection (in order of precedence):
1. BRAIN_PROVIDER env var (ollama | claude | openai | grok)
2. Auto-detect: uses fir... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tests/test_audit_log.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:26.195721 | """Tests for memory/audit_log.py — audit log, rate limiter, circuit breaker."""
import json
import time
import pytest
from memory.audit_log import AuditLog, RateLimiter, CircuitBreaker
from memory.schemas import SchemaError, CURRENT_SCHEMA_VERSION, make_audit_entry
class TestAuditLogWrite:
def test_log_creates... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tests/test_autopilot_guard.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:26.226871 | """Tests for AutopilotGuard — unified pre-request guard for autopilot mode."""
import time
import pytest
from memory.audit_log import (
AutopilotGuard,
CircuitBreaker,
RateLimiter,
SafeMethodPolicy,
)
class TestAutopilotGuardAllow:
"""Safe requests on healthy hosts should be allowed."""
def... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tests/test_intel_engine.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:26.269252 | """Tests for intel_engine.py — memory-aware intel prioritization."""
import json
import os
import pytest
from intel_engine import load_memory_context, prioritize_intel
@pytest.fixture
def memory_dir(tmp_path):
"""Create a mock hunt-memory directory with test data."""
targets_dir = tmp_path / "targets"
t... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tests/test_pattern_db.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:26.284275 | """Tests for memory/pattern_db.py — save, match, duplicate, cross-target."""
import time
import pytest
from memory.pattern_db import PatternDB
from memory.schemas import CURRENT_SCHEMA_VERSION
class TestPatternSave:
def test_save_creates_file(self, patterns_path, sample_pattern_entry):
db = PatternDB(... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tests/test_credential_store.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:26.285909 | """Tests for CredentialStore — secure .env-based credential loading."""
import pytest
from tools.credential_store import CredentialStore
class TestCredentialStoreLoad:
"""Loading credentials from .env files."""
def test_load_from_env_file(self, tmp_path):
env_file = tmp_path / ".env"
env_fi... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tests/test_hackerone_server.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:26.287317 | """Tests for mcp/hackerone-mcp/server.py — HackerOne MCP server tools."""
import json
import pytest
from unittest.mock import patch, MagicMock
from urllib.error import HTTPError, URLError
from io import BytesIO
import sys, os
sys.path.insert(0, os.path.join(os.path.dirname(__file__), "..", "mcp", "hackerone-mcp"))
f... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tests/test_hackerone_mcp.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:26.289216 | """Tests for mcp/hackerone-mcp/server.py — API success, not found, rate limit, timeout.
These tests mock HTTP responses since we don't hit the real HackerOne API in tests.
The MCP server itself doesn't exist yet (Phase 4), so these tests define the expected
contract and will validate the implementation when it's built... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tests/test_hunt_target_types.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:26.290926 | """Tests for target type detection and CIDR safety limits in tools/hunt.py."""
from __future__ import annotations
import importlib.util
from pathlib import Path
def load_hunt_module():
hunt_path = Path(__file__).resolve().parents[1] / "tools" / "hunt.py"
spec = importlib.util.spec_from_file_location("hunt_m... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tests/test_rotation.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:26.312840 | """Tests for memory/rotation.py — size-cap rotation, backup retention, concurrency."""
import json
import multiprocessing as mp
import os
from pathlib import Path
import pytest
from memory.audit_log import AuditLog
from memory.pattern_db import PatternDB
from memory.rotation import (
DEFAULT_KEEP,
list_backu... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tests/test_recon_adapter.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:26.317819 | """Tests for ReconAdapter — normalizes recon output across formats."""
import json
import pytest
from tools.recon_adapter import ReconAdapter
@pytest.fixture
def recon_dir(tmp_path):
"""Create a recon directory with the nested format from recon_engine.sh."""
d = tmp_path / "recon" / "target.com"
for sub... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tests/test_safe_method_policy.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:26.752746 | """Tests for SafeMethodPolicy — enforces safe HTTP methods in autopilot mode."""
import pytest
from memory.audit_log import SafeMethodPolicy
class TestSafeMethodPolicyDefaults:
"""Default policy: GET/HEAD/OPTIONS are safe, everything else requires approval."""
def test_get_is_safe(self):
policy = S... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tests/test_scope_checker.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:27.101372 | """Tests for scope_checker.py — all is_in_scope variants + filter_file.
This is safety-critical code: 100% coverage required.
"""
import pytest
from scope_checker import ScopeChecker
class TestWildcardMatch:
def test_wildcard_matches_subdomain(self, scope_domains, scope_excluded):
sc = ScopeChecker(sc... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tests/test_vuln_scanner_review_fixes.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:27.103509 | """Regression checks for the PR #7 review fixes in tools/vuln_scanner.sh."""
from pathlib import Path
SCANNER_PATH = Path(__file__).resolve().parents[1] / "tools" / "vuln_scanner.sh"
def test_saml_signature_stripping_is_opt_in_and_policy_gated():
scanner = SCANNER_PATH.read_text()
assert "SafeMethodPolicy... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/h1_oauth_tester.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:27.104802 | #!/usr/bin/env python3
"""
HackerOne OAuth / Auth Flow Tester
Tests: OAuth state CSRF, redirect_uri bypass, 2FA bypass, pre-account-takeover,
password reset host header injection.
Usage:
python3 h1_oauth_tester.py --email your@email.com
python3 h1_oauth_tester.py --check-cors
python3 h1_oauth_tester.py --check-r... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tests/test_token_scanner.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:27.105979 | """Tests for tools/token_scanner.py — meme coin red flag scanner."""
import os
import sys
import tempfile
from pathlib import Path
import pytest
# Add project root to path
sys.path.insert(0, os.path.dirname(os.path.dirname(os.path.abspath(__file__))))
from tools.token_scanner import (
Finding,
RiskLevel,
... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/h1_race.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:27.106818 | #!/usr/bin/env python3
"""
HackerOne Race Condition Tester
Tests: bounty double-spend, 2FA rate limits, negative bounty amounts, report action races.
Uses threading for true parallel requests.
Usage:
python3 h1_race.py --token-a TOKEN --test 2fa
python3 h1_race.py --token-a TOKEN --token-b TOKEN_B --test bounty --... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/credential_store.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:27.108361 | """
Secure credential store — loads auth credentials from .env files.
Credentials are loaded from a .gitignored .env file and never written to
hunt-memory, conversation transcripts, or any persistent storage.
Usage:
store = CredentialStore(Path(".env"))
cookie = store.get("TARGET_COOKIE")
headers = store.... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/h1_mutation_idor.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:27.109283 | #!/usr/bin/env python3
"""
HackerOne Mutation IDOR Battery
Tests whether Account B can execute privileged mutations on Account A's report.
Usage:
python3 h1_mutation_idor.py \
--cookie-a "__Host-session=XXXX" \
--cookie-b "__Host-session=YYYY; app_signed_in=true" \
--report-id 3589717 \
--report-gid ... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/h1_idor_scanner.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:27.110511 | #!/usr/bin/env python3
"""
HackerOne Cross-User IDOR Scanner
Systematically tests every GraphQL query/mutation with Account B's token
against Account A's resource IDs. Flags any response where B gets A's data.
Usage:
python3 h1_idor_scanner.py --token-a TOKEN_A --token-b TOKEN_B --report-id REPORT_ID
python3 h1_id... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tests/test_schemas.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:27.212822 | """Tests for memory/schemas.py — validation happy path + error paths."""
import pytest
from memory.schemas import (
validate_journal_entry,
validate_pattern_entry,
validate_target_profile,
make_journal_entry,
make_pattern_entry,
SchemaError,
CURRENT_SCHEMA_VERSION,
)
class TestJournalVali... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/hai_probe.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:27.727854 | #!/usr/bin/env python3
"""
Hai API Probe — Fingerprint HackerOne's AI Copilot
Usage: python3 hai_probe.py --token YOUR_API_TOKEN --api-name YOUR_API_NAME
"""
import argparse
import requests
import json
import time
import sys
BASE_URL = "https://api.hackerone.com/v1"
class HaiProbe:
def __init__(self, api_name, a... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/scope_checker.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:27.733363 | """
Deterministic scope checker — code check, not LLM judgment.
Validates URLs against an allowlist of domain patterns before any outbound request.
Uses anchored suffix matching (not raw fnmatch) to prevent subdomain confusion:
- "*.target.com" matches "sub.target.com" but NOT "evil-target.com"
- "target.com" matc... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/intel_engine.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:27.734881 | #!/usr/bin/env python3
"""
intel_engine.py — On-demand intelligence fetch for a target.
Wraps learn.py data sources + HackerOne MCP + hunt memory context.
Called by /intel command. Outputs prioritized intel with memory context.
Usage:
python3 intel_engine.py --target target.com --tech "nextjs,graphql"
python3... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/recon_adapter.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:27.736141 | #!/usr/bin/env python3
"""
recon_adapter.py — Canonical recon output normalizer.
Resolves TODO-5: recon_engine.sh writes a nested directory format while
recon-agent.md expected flat files. This adapter reads either format and
returns a unified ReconData object.
Canonical format (nested — preferred):
recon/<target... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/mindmap.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:27.739758 | #!/usr/bin/env python3
"""
mindmap.py — Generates a Mermaid mind map + prioritized hunting checklist
based on target type and detected technologies.
Usage:
python3 tools/mindmap.py --target target.com --type opensrc --tech "nextjs,graphql,solidity"
python3 tools/mindmap.py --target example.com --type website --tec... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/hunt.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:27.750378 | #!/usr/bin/env python3
"""
Bug Bounty Hunt Orchestrator
Main script that chains target selection, recon, scanning, and reporting.
Usage:
python3 hunt.py # Full pipeline: select targets + hunt
python3 hunt.py --target <domain> # Hunt a specific target
python3 hunt.py --quick --... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/learn.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:27.756706 | #!/usr/bin/env python3
"""
learn.py Fetches recent bug intelligence for a tech stack.
Queries GitHub Advisory Database, NVD CVE API, and HackerOne Hacktivity.
Usage:
python3 tools/learn.py --tech "nextjs,graphql"
python3 tools/learn.py --tech "nextjs,graphql" --target target.com --output recon/target.com/intel.md... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/memory_gc.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:27.786536 | #!/usr/bin/env python3
"""
Memory GC — inspect and rotate hunt-memory JSONL files.
Scans the hunt-memory directory for append-only logs (audit.jsonl,
patterns.jsonl, journal.jsonl) and reports per-file size + backup usage.
Optionally rotates oversize files or purges existing backups.
Usage:
python -m tools.memory... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/sneaky_bits.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:27.821820 | #!/usr/bin/env python3
"""
Sneaky Bits Encoder/Decoder — Invisible prompt injection via U+2062/U+2064
Based on: embracethered.com/blog/posts/2025/sneaky-bits-and-ascii-smuggler/
U+2062 (invisible times) = binary 0
U+2064 (invisible plus) = binary 1
Usage:
python3 sneaky_bits.py encode "IGNORE PREVIOUS INSTRUCTIONS... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/target_selector.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:28.349403 | #!/usr/bin/env python3
"""
HackerOne Target Selector
Fetches public bug bounty programs, ranks them, and outputs top targets.
Usage:
python3 target_selector.py [--top N] [--output FILE]
"""
import json
import subprocess
import sys
import os
import argparse
from datetime import datetime
TARGETS_DIR = os.path.join... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/zendesk_idor_test.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:28.350741 | #!/usr/bin/env python3
"""
Zendesk IDOR / Broken Access Control Tester
Tests API endpoints for unauthorized access to other orgs' data.
Usage:
export ZENDESK_SUBDOMAIN="your-sandbox-subdomain"
export ZENDESK_EMAIL="your-agent@example.com"
export ZENDESK_API_TOKEN="your_token_here"
python3 zendesk_idor_... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/validate.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:28.357693 | #!/usr/bin/env python3
"""
validate.py — Interactive bug validation assistant.
Walks through the 4 validation gates, checks for duplicates, calculates CVSS,
and generates a skeleton HackerOne report.
Usage:
python3 tools/validate.py
python3 tools/validate.py --output findings/myreport.md
"""
import argparse
impor... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/zero_day_fuzzer.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:28.376487 | #!/usr/bin/env python3
"""
Zero-Day Bug Finder
Automated fuzzing and edge-case testing to discover novel vulnerabilities.
Uses smart fuzzing, logic flaw detection, and unusual input testing.
This focuses on finding bugs that automated scanners miss:
- Business logic flaws
- Race conditions
- Unusual parameter interact... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/token_scanner.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:28.406727 | #!/usr/bin/env python3
"""
Token red flag scanner — deterministic contract analysis for meme coin rug vectors.
Scans Solidity and Rust/Anchor token contracts for known rug pull patterns:
hidden mint, honeypot transfer restrictions, fee manipulation,
LP lock bypasses, authority retention, fake renounce, and MEV amplifi... |
shuvonsec/claude-bug-bounty | https://github.com/shuvonsec/claude-bug-bounty | null | null | null | null | 1,958 | null | null | mit | null | null | null | null | null | null | null | tools/hai_payload_builder.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:37.642890 | #!/usr/bin/env python3
"""
hai_payload_builder.py — VAPT Payload Library + LLM Injection Generator
Two modes:
1. VAPT payloads — print/export payloads for any vulnerability class
2. LLM injection — generate invisible prompt injection payloads (Sneaky Bits)
Usage — VAPT payloads:
python3 hai_payload_builder.py... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/DNS/lazy.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:39.702337 | # $Id: lazy.py,v 1.5.2.7 2011/11/23 17:14:11 customdesigned Exp $
#
# This file is part of the pydns project.
# Homepage: http://pydns.sourceforge.net
#
# This code is covered by the standard Python License. See LICENSE for details.
#
# routines for lazy people.
import Base
from Base import ServerError
def revlookup... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/DNS/Status.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:39.702823 | """
$Id: Status.py,v 1.7.2.1 2011/03/16 20:06:39 customdesigned Exp $
This file is part of the pydns project.
Homepage: http://pydns.sourceforge.net
This code is covered by the standard Python License. See LICENSE for details.
Status values in message header
"""
NOERROR = 0 # No Error ... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/DNS/Base.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:39.711580 | """
$Id: Base.py,v 1.12.2.19 2011/11/23 17:14:11 customdesigned Exp $
This file is part of the pydns project.
Homepage: http://pydns.sourceforge.net
This code is covered by the standard Python License. See LICENSE for details.
Base functionality. Request and Response classes, that sort of thing.
"""
import soc... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/dkim/__init__.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:39.716723 | # This software is provided 'as-is', without any express or implied
# warranty. In no event will the author be held liable for any damages
# arising from the use of this software.
#
# Permission is granted to anyone to use this software for any purpose,
# including commercial applications, and to alter it and redistri... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/DNS/__init__.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:39.720391 | # -*- encoding: utf-8 -*-
# $Id: __init__.py,v 1.8.2.10 2012/02/03 23:04:01 customdesigned Exp $
#
# This file is part of the pydns project.
# Homepage: http://pydns.sourceforge.net
#
# This code is covered by the standard Python License. See LICENSE for details.
#
# __init__.py for DNS class.
__version__ = '2.3.6'
... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/DNS/Class.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:39.721806 | """
$Id: Class.py,v 1.6.2.1 2011/03/16 20:06:39 customdesigned Exp $
This file is part of the pydns project.
Homepage: http://pydns.sourceforge.net
This code is covered by the standard Python License. See LICENSE for details.
CLASS values (section 3.2.4)
"""
IN = 1 # the Internet
CS = 2 # the... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/DNS/Opcode.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:39.722899 | """
$Id: Opcode.py,v 1.6.2.1 2011/03/16 20:06:39 customdesigned Exp $
This file is part of the pydns project.
Homepage: http://pydns.sourceforge.net
This code is covered by the standard Python License. See LICENSE for details.
Opcode values in message header. RFC 1035, 1996, 2136.
"""
QUERY = 0
IQUERY = 1
ST... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/DNS/win32dns.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:39.730281 | """
$Id: win32dns.py,v 1.3.2.3 2011/03/21 21:06:47 customdesigned Exp $
Extract a list of TCP/IP name servers from the registry 0.1
0.1 Strobl 2001-07-19
Usage:
RegistryResolve() returns a list of ip numbers (dotted quads), by
scouring the registry for addresses of name servers
Tested on Windows NT4 S... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/DNS/Type.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:39.778111 | # -*- encoding: utf-8 -*-
"""
$Id: Type.py,v 1.6.2.3 2011/03/16 20:06:39 customdesigned Exp $
This file is part of the pydns project.
Homepage: http://pydns.sourceforge.net
This code is covered by the standard Python License. See LICENSE for details.
TYPE values (section 3.2.2)
"""
A = 1 # a host add... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/DNS/Lib.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:39.781562 | # -*- encoding: utf-8 -*-
"""
$Id: Lib.py,v 1.11.2.11 2011/11/23 17:07:14 customdesigned Exp $
This file is part of the pydns project.
Homepage: http://pydns.sourceforge.net
This code is covered by the standard Python License. See LICENSE for details.
Library code. Largely this is packers and unpackers for vari... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/dkim/__main__.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:40.291210 | import unittest
import doctest
import dkim
from tests import test_suite
doctest.testmod(dkim)
unittest.TextTestRunner().run(test_suite())
|
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/dkim/asn1.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:40.307378 | # This software is provided 'as-is', without any express or implied
# warranty. In no event will the author be held liable for any damages
# arising from the use of this software.
#
# Permission is granted to anyone to use this software for any purpose,
# including commercial applications, and to alter it and redistri... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/dkim/canonicalization.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:40.320663 | # This software is provided 'as-is', without any express or implied
# warranty. In no event will the author be held liable for any damages
# arising from the use of this software.
#
# Permission is granted to anyone to use this software for any purpose,
# including commercial applications, and to alter it and redistri... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/dkim/dnsplug.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:40.358140 | # This software is provided 'as-is', without any express or implied
# warranty. In no event will the author be held liable for any damages
# arising from the use of this software.
#
# Permission is granted to anyone to use this software for any purpose,
# including commercial applications, and to alter it and redistri... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/spf.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:40.359060 | #!/usr/bin/python
"""SPF (Sender Policy Framework) implementation.
Copyright (c) 2003 Terence Way <terry@wayforward.net>
Portions Copyright(c) 2004,2005,2006,2007,2008,2011,2012 Stuart Gathman <stuart@bmsi.com>
Portions Copyright(c) 2005,2006,2007,2008,2011,2012,2013 Scott Kitterman <scott@kitterman.com>
Portions Copy... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/verifyspf.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:40.366487 | #!/usr/bin/env python
"""
Given a the smtp server ip address, the sender email address and the domain
name, check if the smtp server is an authorized sender for the domain.
Usage: python verifyspf.py '180.73.166.174' 'someone@gmail.com' 'gmail.com'
"""
import os
import spf
import sys
def main():
if len(sys.argv)... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/dkim/crypto.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:40.379741 | # This software is provided 'as-is', without any express or implied
# warranty. In no event will the author be held liable for any damages
# arising from the use of this software.
#
# Permission is granted to anyone to use this software for any purpose,
# including commercial applications, and to alter it and redistri... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/verifydkim.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:40.382842 | #!/usr/bin/env python
"""
Given a raw email message on stdin, verify its dkim signature. Exit with code 11
if the signature is not valid.
"""
import dkim
import os
import sys
def main():
msg = sys.stdin.read()
res = None
res = dkim.verify(msg)
print('[' + os.path.basename(__file__) + '] isDkimValid =... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/dkim/util.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:40.384246 | # This software is provided 'as-is', without any express or implied
# warranty. In no event will the author be held liable for any damages
# arising from the use of this software.
#
# Permission is granted to anyone to use this software for any purpose,
# including commercial applications, and to alter it and redistri... |
Flolagale/mailin | https://github.com/Flolagale/mailin | null | null | null | null | 1,957 | null | null | mit | null | null | null | null | null | null | null | python/ipaddr.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:40.392207 | #!/usr/bin/python
#
# Copyright 2007 Google Inc.
# Licensed to PSF under a Contributor Agreement.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICE... |
jimmc414/onefilellm | https://github.com/jimmc414/onefilellm | null | null | null | null | 1,955 | null | null | mit | null | null | null | null | null | null | null | cli.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:42.659929 | from onefilellm import run
def entry_point():
run()
if __name__ == "__main__":
entry_point()
|
jimmc414/onefilellm | https://github.com/jimmc414/onefilellm | null | null | null | null | 1,955 | null | null | mit | null | null | null | null | null | null | null | extras/web_app.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:42.689996 | from flask import Flask, request, render_template_string, send_file, abort
import os
import sys
import ipaddress
from urllib.parse import urlparse
# Import functions from onefilellm.py.
# Ensure onefilellm.py is accessible in the same directory.
from onefilellm import process_github_repo, process_github_pull_request, ... |
jimmc414/onefilellm | https://github.com/jimmc414/onefilellm | null | null | null | null | 1,955 | null | null | mit | null | null | null | null | null | null | null | utils.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:42.690661 | """
Utility functions for OneFileLLM.
This module contains common utilities used across the application including:
- File I/O operations
- Text format detection and parsing
- Network operations
- Path and file type validation
"""
import os
import sys
import re
import requests
from pathlib import Path
from urllib.pars... |
thisjam/sd-webui-oldsix-prompt | https://github.com/thisjam/sd-webui-oldsix-prompt | null | null | null | null | 1,955 | null | null | mit | null | null | null | null | null | null | null | scripts/transerver/baidu.py | null | null | null | null | null | null | Python | 2026-05-04T01:45:50.121592 | '''
Author: Six_God_K
Date: 2024-04-13 12:54:31
LastEditors: Six_God_K
LastEditTime: 2024-04-26 22:05:11
FilePath: \webui\extensions\sd-webui-oldsix-prompt\scripts\transerver\baidu.py
Description:
Copyright (c) 2024 by ${git_name_email}, All Rights Reserved.
'''
import Translator
import requests
import json
class ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.