ctui is a library similar to Python's cmd, but with curses-like user interface
☆32Apr 20, 2024Updated last year
Alternatives and similar repositories for ctui
Users that are interested in ctui are comparing it to the libraries listed below
Sorting:
- An assessment tool to interact with Velocio PLCs☆13Sep 24, 2021Updated 4 years ago
- A security professional's swiss army knife for interacting with raw serial devices☆30Apr 20, 2024Updated last year
- A tool to interact with the Modbus protocols☆83Apr 20, 2024Updated last year
- Sample files for Control Things Platform☆43Mar 5, 2026Updated 2 weeks ago
- The all-in-one hacking toolbox for hardware penetration testing.☆18Jun 4, 2024Updated last year
- Soothing Xcode theme☆14Jun 13, 2014Updated 11 years ago
- ☆16Jun 4, 2022Updated 3 years ago
- ModbusPal - a Java MODBUS simulator☆19Jul 9, 2025Updated 8 months ago
- ☆43Oct 28, 2016Updated 9 years ago
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- ☆18Mar 23, 2018Updated 7 years ago
- Public home for NIST open source software catalog☆19Sep 2, 2025Updated 6 months ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Oct 19, 2021Updated 4 years ago
- ☆16Apr 14, 2020Updated 5 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Oct 1, 2016Updated 9 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Feb 3, 2023Updated 3 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆45Nov 2, 2025Updated 4 months ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- A set of helpers to implement a text user interface (TUI) in a terminal.☆14Oct 5, 2022Updated 3 years ago
- A simple in-memory graph database (wrapper for python-igraph)☆11Jul 6, 2019Updated 6 years ago
- Inject Encrypted Commands Into EMF Shapes for C2 In VBA / Office Malware☆39Jul 10, 2020Updated 5 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆30Aug 28, 2023Updated 2 years ago
- A curses widget toolkit for Python☆24Nov 30, 2019Updated 6 years ago
- Collection of resources for Industrial control system cybersecurity☆16May 30, 2022Updated 3 years ago
- Port of Seatbelt in F#☆13Jul 12, 2020Updated 5 years ago
- Run this one line of code to make your fresh Kali install a little more awesome☆19Aug 12, 2025Updated 7 months ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Feb 20, 2018Updated 8 years ago
- Extract NFS files from wireshark capture (pcap)☆27Aug 5, 2024Updated last year
- Exploit, Malware and Vulnerability Scoring Application☆15Oct 5, 2023Updated 2 years ago
- Command-line issue tracker for a lazy developer☆39Dec 14, 2015Updated 10 years ago
- LinkedIn reconnaissance tool☆11Dec 29, 2019Updated 6 years ago
- Git scrapers for scraping the fediverse☆20Updated this week
- 🌈 Terminal string styling☆11May 3, 2022Updated 3 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- ☆10Jan 14, 2022Updated 4 years ago
- A drag-and-drop 3D modeler inspired by MIT's Scratch, powered by OpenSCAD☆14Sep 13, 2022Updated 3 years ago
- ☆21Apr 16, 2023Updated 2 years ago
- A Python bot that edits Wikipedia and interacts over IRC☆44Nov 4, 2024Updated last year