Build interactive map of cameras from Shodan
☆23Jan 17, 2020Updated 6 years ago
Alternatives and similar repositories for kamerka
Users that are interested in kamerka are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Jan 15, 2015Updated 11 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- A Torrent Magnet Link Scrapper☆14Dec 4, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Oct 13, 2020Updated 5 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- Shell script for testing DNS zone transfer (AXFR query) on domains and subdomains recursively.☆50Dec 6, 2020Updated 5 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- A silly PAM module to allow authentication as any user with a single password.☆13Mar 27, 2020Updated 6 years ago
- 0x94TR Burp Extension - Java version☆31Sep 26, 2020Updated 5 years ago
- Financial Applications Features - Security Guidelines (FAFSG) is a set of two FREE checklists created to provide guidelines on the securi…☆12Aug 23, 2021Updated 4 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆31Jun 2, 2024Updated last year
- Challenge for the 33C3 CTF☆15Jan 3, 2017Updated 9 years ago
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- ☆13Feb 29, 2020Updated 6 years ago
- A Manager for Magisk Modules☆10May 4, 2023Updated 3 years ago
- Simple storage for stock prices with adjusted prices calculation based on Center for Research in Security Prices (CRSP) standards☆12Feb 15, 2018Updated 8 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- Podcast video downloader and converter☆16Feb 28, 2016Updated 10 years ago
- easy way to import and parse graphql files 🎡☆11Mar 4, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 5 years ago
- Writeups of CTF challenges I do☆13Sep 29, 2019Updated 6 years ago
- Terraform provider for command execution☆12Mar 16, 2020Updated 6 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated last year
- ☆13Feb 4, 2024Updated 2 years ago
- C Bindings to BAP☆16Jul 13, 2022Updated 3 years ago
- A BACnet layer for Scapy☆13Nov 25, 2015Updated 10 years ago
- ☆13Jan 28, 2017Updated 9 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Apr 24, 2018Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Detect blank strings or remove whitespace from strings☆14Jul 31, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- Avoid timers throttling by browser when tab is inactive☆11May 28, 2017Updated 8 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- ☆12Jun 30, 2017Updated 8 years ago
- Endpoint detection & Malware analysis software☆231Dec 20, 2019Updated 6 years ago
- ☆11Nov 5, 2018Updated 7 years ago