end to end open source browser use capabilities
☆64Aug 7, 2025Updated 8 months ago
Alternatives and similar repositories for local-browser-use
Users that are interested in local-browser-use are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Dec 8, 2020Updated 5 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 3 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆12Jun 29, 2021Updated 4 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- win32json Parser for TypeLibrary creation☆12Feb 10, 2022Updated 4 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last month
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- ☆12Apr 16, 2025Updated 11 months ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- ☆12Jul 13, 2017Updated 8 years ago
- Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648☆12Jan 14, 2022Updated 4 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- ThunderCls's x64dbg Acid Lime Theme remixed☆12Jul 15, 2022Updated 3 years ago
- Ida Pro plugin to aid in reverse engineering Rust binaries.☆19Dec 9, 2024Updated last year
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Output high level Pcode (PcodeAST) in Ghidra☆16Apr 7, 2023Updated 3 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 10 years ago
- Automatically exported from code.google.com/p/windbgshark☆11Jul 1, 2015Updated 10 years ago
- ☆23Mar 17, 2024Updated 2 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- A free antivirus aggregation software like VirusTotal.☆13Dec 3, 2019Updated 6 years ago