Wu Tingfeng's repositories
Twitter200M
Simple analysis of the Twitter 200M Data Dump of January 2023.
ChongLuaDao-Phishing-Blocklist
Machine-readable .txt blocklist of phishing URLs and IP Addresses from the Chống Lừa Đảo (https://chongluadao.vn) project, updated once a day.
Estonia-Blocked-Gambling-Websites
Machine-readable .txt blocklist of unlicensed gambling websites blocked by the Estonian Tax and Customs Board.
balloon-hashing-kotlin
Balloon Hashing implemented in Kotlin.
meteorite-explorer
Explore The Meteoritical Society's comprehensive data set of all known meteorite landings across the globe.
pypi_package_names
Retrieve all unique package names from the PyPi JSON-based Simple API.
train_arrival
Extract train arrival information from the SMRT Train Arrival Information API.
2fas-android
Source code for 2FAS Android app
andcli
A 2FA TUI for your shell
argon2pure
Pure-python implementation of Argon2 – winner of the Password Hashing Competition
cockroach
CockroachDB - the open source, cloud-native distributed SQL database.
cpython
The Python programming language
draft-lucas-balloon-hashing
An Internet-Draft for the Balloon password hashing function.
flutter_app_as_file_handler_in_android
Simple demonstration of how to set your Android Flutter app to be a "file opener" for specific filetypes.
licensee
A Ruby Gem to detect under what license a project is distributed.
more-itertools
More routines for operating on iterables, beyond itertools
norwegianblue
CLI to show end-of-life dates for a number of products.
rainbowtables
A library where the user can create a rainbowtable.
rstthreats
Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
secret_broadcast
Send encrypted webcam snapshots over Telegram to specific users.
SharedSolutions
Publicly shared solutions to Coding Challenges
simple-icons
SVG icons for popular brands
tldextract
Accurately separate the TLD from the registered domain and subdomains of a URL, using the Public Suffix List.
toy_password_cracker
Toy demonstration of common password cracking methods, namely, brute force, dictionary attacks, and rainbow tables. Hashing algorithms used are MD5, PBKDF2, Scrypt, Balloon, and Argon2id.
ublacklist
Blocks specific sites from appearing in Google search results
uniseg
Unicode Text Segmentation, Word Wrapping, and String Width Calculation in Go