Subdomain Finder Application has 2 tools and 4 web services. With these we are finding the subdomains of the domain.
☆11Dec 16, 2016Updated 9 years ago
Alternatives and similar repositories for sedef
Users that are interested in sedef are comparing it to the libraries listed below
Sorting:
- Free-For-All 2016 yılında ADEO IWS programı için Rails Web Framework'ü ile hazırlanmış, GNU/GPL v3.0 lisansına sahip bir CTF (Capture-the…☆13May 26, 2016Updated 9 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Jun 13, 2013Updated 12 years ago
- A mechanism for chaining UIAlertController's to each other☆10Jun 13, 2018Updated 7 years ago
- Swift validation library for fields and forms.☆12Sep 13, 2022Updated 3 years ago
- Twitter Bot to perform advanced search and automated response☆13Dec 22, 2017Updated 8 years ago
- Jni++ : Thread-safe and type-safe C++11 wrap for Android JNI.☆12Jul 25, 2017Updated 8 years ago
- WarSQLi; "SQL" sunucularında (MS-SQL, MySQL,) bulunan zayıf şifre denemelerini gerçekleştirmek ve tespit edilen SQL hesaplarını kullanara…☆21Dec 19, 2023Updated 2 years ago
- Favorite Xcode themes.☆15Sep 24, 2018Updated 7 years ago
- Simple and easy to use drop down substitution for IOS with search function and flexible data interface.☆28Dec 17, 2015Updated 10 years ago
- Pardus package management system☆22Dec 18, 2017Updated 8 years ago
- network pcap fuzzer☆22Jan 19, 2015Updated 11 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- An analytical debugger programmed in C++, using Qt.☆22May 20, 2012Updated 13 years ago
- A repo for security analytics & threat hunting resources☆21Sep 25, 2018Updated 7 years ago
- Process Hacker 2 hiding from external applications☆19Jun 2, 2015Updated 10 years ago
- Responsive jQuery slider - Fast, lightweight, mobile-friendly. No hand coding.☆11Aug 14, 2015Updated 10 years ago
- Slides that are used in the courses of AUCC☆20Oct 14, 2024Updated last year
- Network Security Notes☆87Feb 21, 2017Updated 9 years ago
- rant blog about CryptoTrooper ransomware, its history, legacy and MalwareTech case☆12Jan 26, 2019Updated 7 years ago
- ☆22May 25, 2017Updated 8 years ago
- Adil Seçim Platformu'nun yayınladığı seçim sonuçları verilerinin tümü☆27Jun 25, 2018Updated 7 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- another lightdm-greeter☆25Nov 16, 2022Updated 3 years ago
- A repository to store Deep Web (onion domain) crawler, scraper, and NLP tools for Tor network.☆23Jul 15, 2016Updated 9 years ago
- I created my own Keylogger I am going to open source its code .But no one is allowed to use it commercially and I have actual copy right…☆11Sep 30, 2017Updated 8 years ago
- ZPU - the worlds smallest 32 bit CPU with GCC toolchain☆16Jul 17, 2014Updated 11 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Jan 30, 2018Updated 8 years ago
- ☆25Aug 10, 2018Updated 7 years ago
- Network Security Monitoring Console☆22Feb 3, 2010Updated 16 years ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 9 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- injavawetrust.coffeeshop☆11Sep 9, 2021Updated 4 years ago
- Ruby library for creating Docx from HTML output☆31Oct 13, 2019Updated 6 years ago
- Crystal wrapper for Http Parser lib: https://github.com/joyent/http-parser☆17Feb 27, 2017Updated 9 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- set of bash scripts to get a list of bad reputation IP addresses☆11Dec 17, 2015Updated 10 years ago
- Packer stuff to build a Kali 1.0.9 vagrant box☆18Mar 11, 2015Updated 11 years ago
- ☆10Feb 22, 2023Updated 3 years ago