☆16Jan 3, 2024Updated 2 years ago
Alternatives and similar repositories for Holonomic_robot_for_education
Users that are interested in Holonomic_robot_for_education are comparing it to the libraries listed below
Sorting:
- ☆11Jan 28, 2025Updated last year
- Control tutorial examples using Flightgear simulator☆17Nov 29, 2023Updated 2 years ago
- Access SentinelOne's Purple AI and security services through the Model Context Protocol (MCP) - query alerts, vulnerabilities, misconfigu…☆66Mar 10, 2026Updated last week
- This will be a repository of SentinelOne Deep Visibility queries both the Standard Queries and the Power Queries. Most of these queries w…☆33Oct 15, 2024Updated last year
- A cheat sheet that contains common enumeration and attack methods for Mail Server.☆41Oct 18, 2022Updated 3 years ago
- A performant auto-rotate software for objects in 3D Printing, whose parameter are trained by an evolutionary algorithm.☆102Mar 19, 2023Updated 3 years ago
- PowerShell module for SentinelOne API☆69Jun 26, 2023Updated 2 years ago
- generative artwork hosted on Ethereum☆180Nov 16, 2021Updated 4 years ago
- CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web …☆84Jul 19, 2024Updated last year
- NTP Exfiltration Tool☆149Nov 14, 2023Updated 2 years ago
- Collection of resources related to phishing☆159Jun 12, 2021Updated 4 years ago
- Simple, reliable, distraction free writer to nudge you towards a better life story. It'll show your receipts.☆434Jul 10, 2025Updated 8 months ago
- Collection of scripts for Querying and Managing Active Directory and Domain Controllers☆215Mar 15, 2021Updated 5 years ago
- Different learning materials☆231Sep 19, 2025Updated 6 months ago
- It bridges my research with a functional tool. I want to provide a safe, open-source framework for hackers to test evasion and for defend…☆285Mar 11, 2026Updated last week
- Exploit Development, Reverse Engineering & Cryptography☆256Feb 26, 2026Updated 3 weeks ago
- A list of public attacks on BitLocker☆417Aug 9, 2025Updated 7 months ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆385Mar 5, 2020Updated 6 years ago
- Important notes and topics on my journey towards mastering Windows Internals☆432May 2, 2024Updated last year
- Forensics artefact collection tool for systems running Microsoft Windows☆433Mar 26, 2025Updated 11 months ago
- Analyse your malware to surgically obfuscate it☆524Dec 17, 2025Updated 3 months ago
- Python client for the Twitter 'search Tweets' and 'count Tweets' endpoints (v2/Labs/premium/enterprise). Now supports Twitter API v2 /rec…☆899Jul 23, 2024Updated last year
- A knowledge base of actionable Incident Response techniques☆662May 31, 2022Updated 3 years ago
- Tinder clone - React Native.☆1,051Nov 20, 2024Updated last year
- ✨ Open Source, Privacy-First and Simple Analytics for Mobile, Desktop and Web Apps☆1,658Feb 22, 2026Updated 3 weeks ago
- Open-Source,ROS Robot Dog Kit☆1,083Nov 30, 2024Updated last year
- A concise, directive, specific, flexible, and free incident response plan template☆764May 7, 2024Updated last year
- Your target's phone's front and back cameras📸 can be accessed by sending a link🔗.☆1,093Mar 7, 2025Updated last year
- A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.☆1,183Dec 27, 2023Updated 2 years ago
- A curated list of awesome resources related to executable packing☆1,548Feb 14, 2026Updated last month
- A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and…☆1,565Updated this week
- Malware samples, analysis exercises and other interesting resources.☆1,621Jan 13, 2024Updated 2 years ago
- yarGen is a generator for YARA rules☆1,781Jan 10, 2026Updated 2 months ago
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of…☆2,227Jun 7, 2023Updated 2 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,264Apr 12, 2024Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆4,458Oct 1, 2025Updated 5 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,668Mar 14, 2026Updated last week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,438Updated this week
- The pattern matching swiss knife☆9,490Feb 10, 2026Updated last month