Configuration templates for common network security platforms.
☆26Nov 7, 2025Updated 3 months ago
Alternatives and similar repositories for configurations
Users that are interested in configurations are comparing it to the libraries listed below
Sorting:
- A collection of my public security advisories.☆28Nov 10, 2025Updated 3 months ago
- repository to hold prebuilt kali nethunter kernel☆17Nov 22, 2021Updated 4 years ago
- ☆31Aug 1, 2020Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- Sahabat ZK1☆11Oct 27, 2019Updated 6 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- ☆14Feb 19, 2023Updated 3 years ago
- Implementation of a transfer hook which allows for OFAC style sanctioned addresses☆11Feb 3, 2025Updated last year
- Material design file manager for Android☆10Jul 4, 2018Updated 7 years ago
- Natural Reader TTS support for kalliope project☆12Sep 26, 2017Updated 8 years ago
- ☆10Mar 11, 2024Updated last year
- A psql configuration file. Many options are available so you can customize it to your needs. Some custom queries are included.☆10Aug 7, 2018Updated 7 years ago
- DNSProxy is a simple DNS proxy server, which helps you to forward DNS requests from clients to another DNS server.☆12Dec 25, 2020Updated 5 years ago
- ☆10Mar 6, 2023Updated 2 years ago
- Man in the middle attack demo☆11Jan 14, 2018Updated 8 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Flask-request-params provides Rails-like interface to HTTP Request Parameters for Flask.☆11May 21, 2024Updated last year
- generate UUID with bash scripting V1 and V4☆10Jun 10, 2021Updated 4 years ago
- ☆12Jul 4, 2024Updated last year
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆41Mar 24, 2018Updated 7 years ago
- ☆12Jun 19, 2023Updated 2 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- Pastry DHT implementation with a standalone libp2p compatible node☆12Jun 22, 2020Updated 5 years ago
- Relay emails, encrypting them with the recipient's public PGP key.☆11Nov 2, 2015Updated 10 years ago
- ☆13Dec 4, 2020Updated 5 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- Service Menu for Dolphin File Manager to upload files to IPFS☆13Nov 27, 2018Updated 7 years ago
- A private P2P CDN☆13Apr 10, 2019Updated 6 years ago
- Block explorer for cosmos-sdk based application☆15Feb 23, 2023Updated 3 years ago
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Test program for AF_PACKET☆12Apr 21, 2017Updated 8 years ago
- Simple IIO FM Radio receive example☆16Feb 23, 2026Updated last week
- vulnerability reporting tool powered by vulners.com and wpvulndb.com☆12Aug 31, 2022Updated 3 years ago
- Things I wish were Go built-ins☆13Sep 29, 2020Updated 5 years ago
- Signal Protocol implementation using secp256k1 keypairs for use with Ethereum☆13Apr 4, 2019Updated 6 years ago
- A generic token-curated registry☆10Nov 28, 2018Updated 7 years ago