Retos Una Al Mes Hispasec
☆17Mar 25, 2024Updated 2 years ago
Alternatives and similar repositories for UAM
Users that are interested in UAM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- View in depth data of all Bluetooth devices around your Ubertooth device. Sends the data remotely to a Discord Webhook if desired so you …☆23Aug 3, 2024Updated last year
- Sample list of penetration test reports☆17Dec 12, 2016Updated 9 years ago
- Repository to save all write-ups from UAM challenges☆29Sep 23, 2020Updated 5 years ago
- Una serie de scripts útiles en un proceso de pentesting.☆44Feb 1, 2026Updated last month
- FARO - Document Sensitivity Detector☆10Sep 30, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Rapid Deployment Infrastructure for Red Teaming and Penetration Testing☆44Aug 29, 2022Updated 3 years ago
- Extrae ip de numeros de telefono☆10Aug 28, 2023Updated 2 years ago
- r2inspect is a professional malware analysis framework that automates deep static inspection for PE, ELF, and Mach-O binaries using the r…☆49Updated this week
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- Hardware PenTesting ToolKit for RPi and Arduino☆19Jun 12, 2020Updated 5 years ago
- 工控态势感知工具 Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks…☆10Sep 10, 2017Updated 8 years ago
- ☆11May 10, 2019Updated 6 years ago
- ☆14Jan 2, 2026Updated 2 months ago
- Files from module_3☆12Aug 24, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Documentation for the Curious Bolt hardware hacking multi-tool☆15Feb 1, 2024Updated 2 years ago
- Cloned from now gone Digitalbond page.☆15Aug 23, 2016Updated 9 years ago
- PhoneIntel is an OSINT tool for retrieving detailed information about phone numbers.☆115Sep 11, 2024Updated last year
- Cypherock EMFI device is a low-cost tool to induce electromagnetic fault injections on general purpose MCUs and SOCs to study various chi…☆22Jan 6, 2024Updated 2 years ago
- A blog describing general hardware and software reverse engineering.☆18Jan 5, 2024Updated 2 years ago
- ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From …☆16Aug 31, 2023Updated 2 years ago
- Libro: Full Red Team: Ethical Hacking: Una guía práctica y profunda sobre hacking ético: técnicas, scripts y estrategias reales para pent…☆30Dec 5, 2025Updated 3 months ago
- Trusted Gateway: hardened router architecture with ARM TrustZone protected firewall, routing, and NIC modules.☆15Jul 19, 2022Updated 3 years ago
- ☆18Mar 23, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- OLD repo for my GitBook (CTF writeups / vuln research / bugbounty) - please check out cryptocat.me/blog for the updated content!☆17Dec 30, 2025Updated 2 months ago
- Python module to get and analyze data from Binance very easily.☆25Mar 14, 2026Updated last week
- Just messing with an FPGA☆25Dec 13, 2019Updated 6 years ago
- ☆23Jan 9, 2023Updated 3 years ago
- Curso de programación desde cero con Python 3☆49Jul 6, 2022Updated 3 years ago
- IoT Hacking Kit Details☆19Aug 19, 2025Updated 7 months ago
- Curso completo para aprender Rust paso a paso☆17Sep 20, 2023Updated 2 years ago
- module 2 Exercises☆22Aug 9, 2020Updated 5 years ago
- A Open Source INTelligence (OSINT) Report for Dillard's. the OSINT model is a collection of publicly available sources of information on …☆18Oct 5, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Automated Security Risk Identification Using AutomationML-based Engineering Data☆31Jul 24, 2022Updated 3 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Nov 27, 2023Updated 2 years ago
- Se trata de un análisis forense de un caso real, que por medio de una imagen, se obtiene una serie de datos que ayudan a una investigació…☆22May 11, 2018Updated 7 years ago
- reCAPTCHA lookalike widget☆58Apr 6, 2025Updated 11 months ago
- A custom piece of hardware that communicates with the other same device over a secure 865MHz (EU868/US915/AU915/KR920/IN865) channel usin…☆25Apr 28, 2023Updated 2 years ago
- An injector to load dynamic libraries into other processes' memory☆22Sep 3, 2017Updated 8 years ago
- ☆28Nov 15, 2019Updated 6 years ago