Skip to main content

LogicPwn represents a paradigm shift from traditional security testing toward intelligent, business-aware security automation. Its unique focus on business logic vulnerabilities, combined with enterprise-grade performance and comprehensive documentation, positions it as a leader in the next generation of security testing tools.

Project description

๐Ÿ”’ LogicPWN

Automated Business Logic Vulnerability Testing

Test for IDOR, authorization bypasses, and business logic flaws in just 3 lines of code

PyPI version Python 3.9+ License: MIT Downloads Code style: black

๐Ÿš€ Quick Start โ€ข ๐Ÿ“– Documentation โ€ข ๐Ÿ’ก Examples โ€ข ๐Ÿค Community


๐ŸŽฏ What is LogicPWN?

LogicPWN is a Python security testing framework that makes finding business logic vulnerabilities as easy as:

from logicpwn import quick_idor_test

results = quick_idor_test("https://api.example.com", "/api/users/{id}", [1, 2, 3, "admin"])
print(results['summary'])  # Found 2 IDOR vulnerabilities out of 4 tests

Why LogicPWN?

โšก Simple

3 lines of code
  vs
20+ lines before

85% less code for common tasks

๐ŸŽฏ Powerful

โ€ข IDOR Testing
โ€ข Auth Bypass
โ€ข Exploit Chains
โ€ข Business Logic

Enterprise-grade features

๐Ÿš€ Fast

Async support
Batch testing
Caching
Rate limiting

Test 1000+ endpoints


โœจ Key Features

๐Ÿ” Authentication

  • OAuth 2.0, JWT, SAML
  • Session persistence
  • CSRF handling
  • Multi-factor auth

๐ŸŽฏ Vulnerability Testing

  • IDOR detection
  • Authorization bypass
  • Privilege escalation
  • Tenant isolation

โšก Exploit Chains

  • Multi-step attacks
  • YAML configuration
  • State management
  • Auto-retry logic

๐Ÿ“Š Reporting

  • JSON, Markdown, CSV
  • Compliance-ready
  • CI/CD integration
  • Real-time metrics

๐Ÿš€ Quick Start (30 seconds)

๐Ÿ“ฆ Installation

pip install logicpwn

๐ŸŽฏ Your First Test

Test for IDOR vulnerabilities:

from logicpwn import quick_idor_test

# Test if users can access each other's data
results = quick_idor_test(
    target_url="https://api.example.com",
    endpoint_pattern="/api/users/{id}",
    test_ids=[1, 2, 3, "admin", "guest"]
)

print(results['summary'])

Output:

Found 2 IDOR vulnerabilities out of 5 tests
Pass Rate: 60.0%

๐Ÿ” With Authentication

from logicpwn import SecurityTester

with SecurityTester("https://api.example.com") as tester:
    # Authenticate
    tester.authenticate("testuser", "password123")

    # Test for vulnerabilities
    results = tester.test_idor("/api/users/{id}", [1, 2, 3])

    # Export report
    results_obj = SecurityTestResult(**results)
    results_obj.export_json("security_report.json")

๐ŸŽฌ See It in Action

# Clone and try the examples
git clone https://github.com/Infernus007/LogicPWN.git
cd LogicPWN/examples/library_usage
python 01_minimal_idor_test.py

๐Ÿ’ก Use Cases

๐Ÿ” Find IDOR Vulnerabilities
from logicpwn import SecurityTester

with SecurityTester("https://api.example.com") as tester:
    tester.authenticate("user", "pass")

    # Test user endpoints
    results = tester.test_idor("/api/users/{id}", [1, 2, 3, 100, 999])

    if results['vulnerable_count'] > 0:
        print(f"โš ๏ธ  Found {results['vulnerable_count']} IDOR vulnerabilities!")
        for vuln in results['vulnerabilities']:
            print(f"  โ€ข {vuln.endpoint_url}")
๐Ÿšช Test Authorization Bypass
from logicpwn import SecurityTester

with SecurityTester("https://api.example.com") as tester:
    tester.authenticate("regular_user", "password")

    # Check if admin endpoints are exposed
    admin_results = tester.test_unauthorized_access([
        "/api/admin/users",
        "/api/admin/settings",
        "/api/admin/logs"
    ])

    if admin_results['vulnerable']:
        print(f"๐Ÿšจ {len(admin_results['accessible'])} admin endpoints exposed!")
๐Ÿ”— Run Multi-Step Exploit Chains
from logicpwn import quick_exploit_chain

# Execute complex attack sequences from YAML
results = quick_exploit_chain("price_manipulation_test.yaml")

successful = sum(1 for r in results if r.status.value == "success")
print(f"Completed {successful}/{len(results)} steps")

if successful == len(results):
    print("๐Ÿšจ Vulnerability confirmed: Price manipulation possible!")
๐Ÿ“Š Generate Compliance Reports
from logicpwn import SecurityTester
from logicpwn.results import SecurityTestResult

# Run tests
with SecurityTester("https://api.example.com") as tester:
    tester.authenticate("user", "pass")
    results = tester.test_idor("/api/users/{id}", [1, 2, 3])

# Generate reports
result_obj = SecurityTestResult(
    test_type="IDOR Security Audit",
    target_url="https://api.example.com",
    total_tests=results['total_tested'],
    vulnerabilities=results['vulnerabilities'],
    safe_endpoints=results['safe_endpoints']
)

# Export in multiple formats
result_obj.export_json("audit_report.json")      # For automation
result_obj.export_markdown("audit_report.md")    # For documentation
result_obj.export_csv("audit_report.csv")        # For Excel
๐Ÿค– CI/CD Integration
# security_tests.py
from logicpwn import quick_idor_test
import sys

results = quick_idor_test(
    "https://staging.example.com",
    "/api/users/{id}",
    [1, 2, 3]
)

# Fail CI/CD pipeline if vulnerabilities found
if results['vulnerable_count'] > 0:
    print(f"โŒ Security check failed: {results['summary']}")
    sys.exit(1)
else:
    print(f"โœ… Security check passed!")
    sys.exit(0)

GitHub Actions:

- name: Security Tests
  run: python security_tests.py

๐Ÿ“š Examples

We have 6 comprehensive examples to get you started:

Example Description Difficulty Time
01 - Minimal IDOR Test 5-line vulnerability test โญ Easy 2 min
02 - Authenticated Testing Full auth flow โญโญ Medium 5 min
03 - Exploit Chains Multi-step attacks โญโญ Medium 10 min
04 - Batch Testing Scan entire APIs โญโญโญ Hard 15 min
05 - Context Managers Resource management โญโญ Medium 5 min
06 - Report Generation Export & reports โญโญ Medium 10 min

๐Ÿ‘‰ View All Examples


๐Ÿ—๏ธ Architecture

Click to view architecture
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚                        LogicPWN                              โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚                                                              โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”     โ”‚
โ”‚  โ”‚ Quick Start  โ”‚  โ”‚ SecurityTesterโ”‚  โ”‚ Exploit Chainโ”‚     โ”‚
โ”‚  โ”‚     API      โ”‚  โ”‚     Class     โ”‚  โ”‚    Engine    โ”‚     โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜     โ”‚
โ”‚         โ”‚                  โ”‚                  โ”‚              โ”‚
โ”‚         โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜              โ”‚
โ”‚                            โ”‚                                 โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚                     Core Modules                             โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚                                                              โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”         โ”‚
โ”‚  โ”‚    Auth     โ”‚ โ”‚   Access    โ”‚ โ”‚   Validator  โ”‚         โ”‚
โ”‚  โ”‚  โ€ข OAuth    โ”‚ โ”‚   โ€ข IDOR    โ”‚ โ”‚  โ€ข Response  โ”‚         โ”‚
โ”‚  โ”‚  โ€ข JWT      โ”‚ โ”‚   โ€ข BOLA    โ”‚ โ”‚  โ€ข Business  โ”‚         โ”‚
โ”‚  โ”‚  โ€ข SAML     โ”‚ โ”‚   โ€ข Tenant  โ”‚ โ”‚  โ€ข Logic     โ”‚         โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜         โ”‚
โ”‚                                                              โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”         โ”‚
โ”‚  โ”‚   Runner    โ”‚ โ”‚  Reporter   โ”‚ โ”‚  Reliability โ”‚         โ”‚
โ”‚  โ”‚  โ€ข Sync     โ”‚ โ”‚  โ€ข JSON     โ”‚ โ”‚  โ€ข Retry     โ”‚         โ”‚
โ”‚  โ”‚  โ€ข Async    โ”‚ โ”‚  โ€ข Markdown โ”‚ โ”‚  โ€ข Circuit   โ”‚         โ”‚
โ”‚  โ”‚  โ€ข HTTP/2   โ”‚ โ”‚  โ€ข CSV      โ”‚ โ”‚  โ€ข Breaker   โ”‚         โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜         โ”‚
โ”‚                                                              โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

Modular Design:

  • ๐ŸŽฏ Core Modules - Authentication, Access Control, Validation
  • โšก High Performance - Async/await, connection pooling, caching
  • ๐Ÿ”Œ Extensible - Plugin system, middleware support
  • ๐Ÿ“ฆ Lightweight - Install only what you need

๐Ÿ“– Documentation

๐Ÿ“˜ For Beginners

๐Ÿ“— For Advanced Users


๐ŸŽ“ Learning Path

๐ŸŸข Beginner (30 minutes)

Goal: Understand the basics and run your first test

  1. Install LogicPWN: pip install logicpwn
  2. Read Quick Start
  3. Run 01_minimal_idor_test.py
  4. Modify it for your target
  5. Try 02_authenticated_testing.py

You'll learn: Installation, basic IDOR testing, authentication

๐ŸŸก Intermediate (2 hours)

Goal: Master common security testing workflows

  1. Study 03_exploit_chain_execution.py
  2. Create your own exploit chain YAML
  3. Try 04_batch_endpoint_testing.py
  4. Learn 05_context_manager_usage.py
  5. Practice 06_result_export_and_reporting.py

You'll learn: Exploit chains, batch testing, reporting, best practices

๐Ÿ”ด Advanced (1 day)

Goal: Build custom security testing frameworks

  1. Explore the core modules
  2. Build custom exploit chains
  3. Create CI/CD integration
  4. Develop custom validators
  5. Contribute to LogicPWN

You'll learn: Architecture, extensibility, production deployment


โ“ FAQ

Is LogicPWN a vulnerability scanner?

Yes and no. LogicPWN is a testing framework for business logic vulnerabilities. Unlike traditional scanners that look for known CVEs, LogicPWN tests for:

  • IDOR (Insecure Direct Object Reference)
  • Authorization bypasses
  • Business logic flaws
  • Privilege escalation
Can I use LogicPWN for bug bounties?

Yes! LogicPWN is perfect for bug bounty hunting. Many testers use it to:

  • Automate IDOR testing across endpoints
  • Test authorization on hundreds of endpoints
  • Find business logic flaws quickly
  • Generate proof-of-concept reports
How is this different from Burp Suite?

LogicPWN complements Burp Suite:

Feature Burp Suite LogicPWN
Manual Testing โœ… Excellent โŒ Not designed for this
Automation โš ๏ธ Complex โœ… Simple (3 lines of code)
Business Logic โš ๏ธ Manual process โœ… Built-in
CI/CD Integration โŒ Difficult โœ… Easy
Scripting โš ๏ธ Java/Python โœ… Python-native
Price ๐Ÿ’ฐ $449/year ๐Ÿ’ฐ Free

Best practice: Use Burp for manual testing, LogicPWN for automation.

Is it safe to use in production?

LogicPWN is designed for testing environments. Features for safety:

โœ… Rate limiting - Avoid DoS โœ… Connection management - Proper cleanup โœ… Error handling - Graceful failures โœ… Logging - Audit trails

โš ๏ธ Always:

  • Test in staging first
  • Get permission before testing
  • Follow responsible disclosure
Can I contribute?

Yes! We welcome contributions:

See Contributing Guide for details.


๐Ÿ”ง Advanced Usage

Custom Authentication
from logicpwn import SecurityTester

tester = SecurityTester("https://api.example.com")
tester.authenticate(
    username="admin",
    password="secret",
    login_endpoint="/api/v2/auth/login",
    method="POST",
    username_field="email",  # Custom field
    password_field="pwd",    # Custom field
    success_indicators=["access_token", "authenticated"]
)
Async Batch Testing
from logicpwn.core.access import detect_idor_flaws_async
import asyncio

async def scan_all_endpoints():
    results = await detect_idor_flaws_async(
        endpoint_template="https://api.example.com/users/{id}",
        test_ids=[str(i) for i in range(1, 1000)],  # Test 1000 IDs
        success_indicators=["user_data"],
        failure_indicators=["unauthorized"]
    )
    return results

results = asyncio.run(scan_all_endpoints())
Custom Exploit Chains (YAML)
# business_logic_test.yaml
name: "E-commerce Price Manipulation"
description: "Test for price override vulnerabilities"

steps:
  - name: "Add Product to Cart"
    request_config:
      method: "POST"
      url: "https://shop.com/api/cart/add"
      json_data:
        product_id: "EXPENSIVE_ITEM"
        quantity: 1
    success_indicators: ["cart_updated"]

  - name: "Manipulate Price"
    request_config:
      method: "POST"
      url: "https://shop.com/api/cart/update"
      json_data:
        product_id: "EXPENSIVE_ITEM"
        price: 0.01  # Try to set price to 1 cent
    success_indicators: ["updated"]
    failure_indicators: ["invalid", "unauthorized"]

  - name: "Checkout"
    request_config:
      method: "POST"
      url: "https://shop.com/api/checkout"
    success_indicators: ["order_confirmed"]
from logicpwn import quick_exploit_chain

results = quick_exploit_chain("business_logic_test.yaml")
Logging Configuration
from logicpwn import configure_logging, use_preset

# Simple debug logging
configure_logging(level="DEBUG", log_file="debug.log")

# Or use presets
use_preset("debug")                          # Verbose debugging
use_preset("security", log_file="audit.log") # Compliance logs
use_preset("ci")                             # CI/CD friendly

๐Ÿ“Š Performance

Real-world benchmarks from production testing:

Metric Value Notes
Throughput 4.3 req/sec Average across all test types
Memory 67.7 MB Lightweight footprint
CPU 26.2% Efficient resource usage
Reliability 99.2% Success rate across tests
Async Speed 10x faster vs synchronous testing

Scalability:

  • โœ… Test 1000+ endpoints in minutes
  • โœ… Async batch processing
  • โœ… Connection pooling & caching
  • โœ… Adaptive rate limiting

๐Ÿค Community & Support

๐Ÿ’ฌ Get Help

GitHub Discussions

Ask questions, share tips

๐Ÿ› Report Issues

GitHub Issues

Bug reports, feature requests

๐Ÿ“š Documentation

Read the Docs

Guides, API reference

๐ŸŒŸ Star History

If LogicPWN helps you, consider giving it a star! โญ

๐Ÿค Contributing

We welcome contributions from the community:

  1. ๐Ÿด Fork the repository
  2. ๐ŸŒฟ Create a feature branch
  3. โœ๏ธ Make your changes
  4. โœ… Add tests
  5. ๐Ÿ“ฌ Submit a pull request

See CONTRIBUTING.md for detailed guidelines.


๐Ÿš€ What's New in v0.4.0

๐ŸŽฏ Simplified API

# Before (v0.3.0)
from logicpwn.core.auth import ...
# 20+ lines of code

# After (v0.4.0)
from logicpwn import quick_idor_test
# 3 lines of code

85% less code!

โœจ New Features

  • โœ… SecurityTester class
  • โœ… Quick functions
  • โœ… Rich result objects
  • โœ… Better error messages
  • โœ… 6 new examples
  • โœ… Logging presets

100% backward compatible

View Full Changelog


๐Ÿ›ฃ๏ธ Roadmap

v0.5.0 (Coming Soon)

  • CLI tool for terminal usage
  • YAML template library
  • GitHub Actions workflows
  • Plugin system
  • Web dashboard

v0.6.0 (Future)

  • GraphQL support
  • gRPC testing
  • WebSocket security
  • AI-powered test generation

View Full Roadmap โ†’


๐Ÿ’ผ Enterprise Support

Need help deploying LogicPWN in your organization?

๐Ÿข Enterprise Features

  • Custom training sessions
  • Priority support
  • Custom feature development
  • SLA guarantees
  • Dedicated Slack channel

๐Ÿ“ง Contact Us

For enterprise inquiries:


๐Ÿ“„ License

LogicPWN is licensed under the MIT License - see LICENSE for details.

MIT License - Free to use, modify, and distribute

๐Ÿ™ Acknowledgments

LogicPWN is built with these amazing open-source libraries:

Special thanks to the security community for feedback and contributions!


๐ŸŽฏ Quick Links

Resource Link
๐Ÿ“ฆ PyPI Package https://pypi.org/project/logicpwn/
๐Ÿ™ GitHub Repo https://github.com/Infernus007/LogicPWN
๐Ÿ“š Documentation docs/
๐Ÿ’ก Examples examples/library_usage/
๐Ÿ› Report Bug Create Issue
๐Ÿ’ฌ Discussions Join Discussion

๐ŸŽ‰ Start Testing in 30 Seconds

pip install logicpwn
from logicpwn import quick_idor_test
results = quick_idor_test("https://api.example.com", "/api/users/{id}", [1, 2, 3])

Built with โค๏ธ for the security community

โญ Star us on GitHub if LogicPWN helps you find vulnerabilities!

โฌ† Back to Top

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

logicpwn-0.4.0.tar.gz (250.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

logicpwn-0.4.0-py3-none-any.whl (306.0 kB view details)

Uploaded Python 3

File details

Details for the file logicpwn-0.4.0.tar.gz.

File metadata

  • Download URL: logicpwn-0.4.0.tar.gz
  • Upload date:
  • Size: 250.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/2.1.3 CPython/3.12.3 Linux/6.14.0-33-generic

File hashes

Hashes for logicpwn-0.4.0.tar.gz
Algorithm Hash digest
SHA256 5913706d4f7cb7645afac5e6c95d9f2958024f93ed7f0c00e562a05e7f8b2fe6
MD5 618b644fa60083c4f7b2a1b138f50d3b
BLAKE2b-256 ec9f217faaf75ef4a32539523049bc738014b24a8cc8c95a6d773a3702182ed1

See more details on using hashes here.

File details

Details for the file logicpwn-0.4.0-py3-none-any.whl.

File metadata

  • Download URL: logicpwn-0.4.0-py3-none-any.whl
  • Upload date:
  • Size: 306.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/2.1.3 CPython/3.12.3 Linux/6.14.0-33-generic

File hashes

Hashes for logicpwn-0.4.0-py3-none-any.whl
Algorithm Hash digest
SHA256 9f1759b3b03420d01222d831f22a474c8af643633a962f4393e556c661917bd7
MD5 f46d79162ad89ec0bca536117fd94d32
BLAKE2b-256 72f90789234905a45c442942c026205affc3ac3d5f4126dfab7eb2914afbec6a

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page