Zen by Aikido protects your Python app against attacks with one line of code. Get peace of mind— at runtime.
☆99Feb 27, 2026Updated last week
Alternatives and similar repositories for firewall-python
Users that are interested in firewall-python are comparing it to the libraries listed below
Sorting:
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- speeds up your Rust program's execution by "priming" memory pages from your binary☆13Aug 22, 2024Updated last year
- Sweetcher: For those who know the hell of enterprise proxies☆16Sep 6, 2024Updated last year
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- A milter that performs DKIM and ARC signatures.☆10Jan 23, 2026Updated last month
- TCP Trafficgenerator and Proxy☆11Jan 8, 2026Updated last month
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- ☆12Apr 20, 2025Updated 10 months ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- ☆10Aug 9, 2024Updated last year
- ☆13Dec 12, 2022Updated 3 years ago
- My attempt at learning Solana program (smart contract) development through RareSkill's Solana course.☆15Aug 21, 2024Updated last year
- ☆12Feb 20, 2026Updated 2 weeks ago
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- Capture webpage and save as image using chromedp☆18Updated this week
- Discord Bot for Realtime Updates from CTFd☆10Jan 10, 2021Updated 5 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- tamper resistant audit log☆17Aug 30, 2018Updated 7 years ago
- The first version of the Samsung Internet Developer Advocacy dashboard - the new one is on Glitch here: https://glitch.com/~samsung-inter…☆11Nov 2, 2018Updated 7 years ago
- ☆11Jun 1, 2022Updated 3 years ago
- On-going VA modeling research. Modeling dynamic range compressor using S4.☆19Nov 29, 2025Updated 3 months ago
- A small WinRM client designed for interacting with JEA endpoints.☆13Aug 29, 2024Updated last year
- ☆10Jan 8, 2023Updated 3 years ago
- Collection of patches for nginx to run it as a Nanos unikernel☆11Sep 21, 2023Updated 2 years ago
- ☆13May 18, 2022Updated 3 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- ☆19Jul 23, 2025Updated 7 months ago
- MailHunter is a tool to give you access to the exchange server mails.☆12Apr 16, 2021Updated 4 years ago
- ☆16Aug 14, 2024Updated last year
- Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics☆12Nov 20, 2024Updated last year
- ☆18Updated this week
- Hey there! Welcome to my collection of bug bounty and security testing resources. Whether you're just starting out or already deep into y…☆11Dec 25, 2025Updated 2 months ago
- ☆10Dec 8, 2022Updated 3 years ago
- Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injectio…☆18Jul 28, 2025Updated 7 months ago
- Kudzu is a Go C2 platform with an emphasis on extensibility.☆11Mar 30, 2021Updated 4 years ago
- A tool to check for response status codes with ease☆13Apr 29, 2023Updated 2 years ago
- A list of articles outside of the official MLIR docs that I've found useful for learning MLIR☆11Aug 16, 2023Updated 2 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- ☆14Dec 24, 2024Updated last year