OSDP attack tool (and the Elvish word for friend)
☆111Aug 15, 2023Updated 2 years ago
Alternatives and similar repositories for mellon
Users that are interested in mellon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Resources for the SIA OSDP Verified Testing Program☆14Jan 6, 2026Updated 4 months ago
- OSDP (Open Supervised Device Protocol) library; this project provides a C library for OSDP with bindings/glues for various platforms and …☆186Apr 26, 2026Updated last week
- A Python control panel implementation of the Open Supervised Device Protocol (OSDP)☆40Oct 29, 2020Updated 5 years ago
- Wiegand data logger, replay device and micro door-controller☆14Jan 5, 2024Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Oct 31, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A .NET Core control panel implementation of the Open Supervised Device Protocol(OSDP)☆60Apr 26, 2026Updated last week
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆16Jun 14, 2024Updated last year
- Collection of tools to use with Azure Applications☆113Oct 13, 2023Updated 2 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- ☆41Dec 8, 2021Updated 4 years ago
- passive keyless entry exploit research☆33Aug 4, 2021Updated 4 years ago
- ☆13Apr 24, 2023Updated 3 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆60Apr 16, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- ☆188Apr 29, 2026Updated last week
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Smart Card PIN swiping DLL☆78Oct 4, 2020Updated 5 years ago
- ☆35Updated this week
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆341Jun 6, 2022Updated 3 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆83Sep 13, 2024Updated last year
- Everything and anything related to password spraying☆152May 20, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Jul 25, 2023Updated 2 years ago
- ☆94May 14, 2022Updated 3 years ago
- ☆25Feb 9, 2022Updated 4 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- ☆37Sep 29, 2020Updated 5 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆118Sep 30, 2024Updated last year
- ☆11Aug 31, 2023Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆61Feb 4, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆79Aug 2, 2023Updated 2 years ago
- EDRSandblast-GodFault☆272Aug 28, 2023Updated 2 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- ☆84May 19, 2024Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆169May 6, 2023Updated 3 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- nard a dual sim/sam card interface for the flipper zero☆106Nov 25, 2024Updated last year