Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool
☆34Jan 18, 2026Updated last month
Alternatives and similar repositories for pgread
Users that are interested in pgread are comparing it to the libraries listed below
Sorting:
- A highly flexible AI Agent-driven EVM smart contract vulnerability detection framework☆63Feb 14, 2026Updated 2 weeks ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆16Dec 23, 2024Updated last year
- Comprehensive course materials for 'Linux for Cyber Security', covering everything from basic Linux fundamentals to advanced security pra…☆14Sep 28, 2024Updated last year
- ☆17Feb 18, 2026Updated last week
- Knowledge Manager Agent for Claude Code - Extract and organize content from web, PDF, social media to Obsidian/Notion☆27Updated this week
- ☆11Apr 18, 2022Updated 3 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Updated this week
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- ☆38Updated this week
- ☆10Nov 1, 2021Updated 4 years ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- A SQL migration tool for many databases☆12Feb 1, 2026Updated last month
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆12Dec 8, 2025Updated 2 months ago
- 0day-today-archive: Historical collection of exploits and vulnerabilities from 0day.today☆34Sep 22, 2025Updated 5 months ago
- ☆35Updated this week
- Android gallery spyware☆12Feb 7, 2023Updated 3 years ago
- MCP server for YouTube transcript extraction, channel monitoring, and content intelligence☆40Feb 19, 2026Updated last week
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated 2 years ago
- ☆29Jan 19, 2026Updated last month
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 6 months ago
- This is a powershell module to help implement the AD Tier Model☆14Feb 17, 2026Updated last week
- SPAM filter rules for Stalwart Mail Server☆14Dec 16, 2025Updated 2 months ago
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- Extended version of bios generators☆13Oct 18, 2016Updated 9 years ago
- Skills for AI coding agents to integrate with the Jupiter ecosystem.☆55Feb 23, 2026Updated last week
- ☆13May 27, 2018Updated 7 years ago
- Lightweight reflection scanner☆20Aug 31, 2025Updated 6 months ago
- Localroot Privelege escalation for linux☆13Aug 5, 2024Updated last year
- A fast, deterministic, non-cryptographic hash for use in hash tables for Rust☆15Jan 12, 2021Updated 5 years ago
- ☆11Dec 22, 2023Updated 2 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- ☆17Mar 8, 2024Updated last year
- WordPress File Upload RCE Exploit☆17Sep 1, 2025Updated 6 months ago
- ☆31Sep 12, 2025Updated 5 months ago
- Deploy IRC server using Docker☆13Dec 15, 2023Updated 2 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Apr 15, 2019Updated 6 years ago
- Headless voice interface for the Pi Coding Agent☆44Feb 13, 2026Updated 2 weeks ago
- Monitoring Windows processes tool for malware analysis. Inspired by Regshot tool.☆13Jun 24, 2024Updated last year