A user-friendly solution to transfer files through a physical diode using the Lidi utility, complete with data retention, file history, user accounts and admin management. Provides a scriptable API and a web interface.
☆154Feb 6, 2026Updated 2 months ago
Alternatives and similar repositories for eurydice
Users that are interested in eurydice are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mapping the information system / Cartographie du système d'information☆501Updated this week
- Specialized testing tool designed to identify vulnerabilities and bugs in OPC UA (Open Platform Communications Unified Architecture) impl…☆43Feb 4, 2026Updated 2 months ago
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆129Dec 15, 2025Updated 3 months ago
- Speed up your pentest enumeration☆83Oct 5, 2025Updated 6 months ago
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆344Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- SwitchToOpen - The open source shift☆305Nov 21, 2025Updated 4 months ago
- This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engage…☆56Dec 21, 2025Updated 3 months ago
- UDP and IP over HTTP/3☆23Nov 12, 2025Updated 4 months ago
- Data-Shield IPv4 Blocklist Community provides an official, curated registry of IPv4 addresses identified as malicious. Updated continuous…☆555Updated this week
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆33Mar 6, 2025Updated last year
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆55Mar 24, 2026Updated 2 weeks ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆107Dec 29, 2024Updated last year
- PowerShell module for Office 365 and Azure log collection☆280Sep 22, 2025Updated 6 months ago
- Shellcode loader based on indirect syscall☆22Feb 9, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆169Nov 3, 2025Updated 5 months ago
- Sploit -- All-in-one, AI-powered cybersecurity toolkit for web, network, and phishing tests. Modular, cross-platform, Docker-ready, wit…☆32Aug 29, 2025Updated 7 months ago
- Installation de la plateforme Cloud Pi Native☆26Mar 31, 2026Updated last week
- An OSINT tool for IT ninjas.☆11Jul 31, 2024Updated last year
- Protect your data in minutes !☆125Nov 5, 2024Updated last year
- Fully featured and community-driven hacking environment☆2,967Mar 25, 2026Updated 2 weeks ago
- ☆23Feb 27, 2026Updated last month
- Assess the security of your Active Directory with few or all privileges.☆366Mar 16, 2026Updated 3 weeks ago
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆419Feb 13, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A centralized and enhanced memory analysis platform☆524Mar 20, 2026Updated 3 weeks ago
- Convert between pulldown parser events for various markup formats☆24Dec 22, 2025Updated 3 months ago
- python 2 arp poisonner☆15Sep 30, 2022Updated 3 years ago
- BreizhCTF 2023 - Challenges☆25Mar 23, 2023Updated 3 years ago
- ☆221May 9, 2024Updated last year
- 🦊 DISINFOX is a threat intelligence exchange platform for disinformation implementing the DISARM framework at its core.☆51Jul 21, 2025Updated 8 months ago
- Identify the accounts most vulnerable to dictionary attacks☆121Apr 2, 2025Updated last year
- ☆70Aug 7, 2025Updated 8 months ago
- Virtual machines manipulation framework☆104Mar 17, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Outil de sécurité des architectures kubernetes avancées☆82Nov 27, 2025Updated 4 months ago
- VULNSPY regularly retrieves the latest alerts published by the CERT-FR and the related vulnerabilities with their CVSS score and allows y…☆38Nov 3, 2022Updated 3 years ago
- ☆17Feb 14, 2025Updated last year
- The AI-Native Cinematic Studio. A professional Non-Linear Editor (NLE) for filmmakers.☆73Mar 16, 2026Updated 3 weeks ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,711Nov 29, 2024Updated last year
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated d…☆283Updated this week
- A collection of scripts and tools for managing ADFS☆14Aug 6, 2018Updated 7 years ago