☆11Dec 17, 2018Updated 7 years ago
Alternatives and similar repositories for Nebula
Users that are interested in Nebula are comparing it to the libraries listed below
Sorting:
- ☆29Dec 11, 2025Updated 2 months ago
- Script to automate COVID-19 vaccination slot booking on India's Co-WIN Platform☆10Oct 12, 2021Updated 4 years ago
- Blog about HTTP Request Smuggling, including a demo application.☆32Jan 4, 2022Updated 4 years ago
- Stupid simple XOR encryption utility☆34Oct 3, 2025Updated 4 months ago
- Bashful argument parsing☆13May 13, 2020Updated 5 years ago
- ☆13Jan 17, 2025Updated last year
- Access nearly every directory from within a sandboxed application.☆23Aug 12, 2010Updated 15 years ago
- A block-based programming environment for Arduino.☆16Jan 12, 2026Updated last month
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- A collection of tools to manage asynchronous tasks in crystal☆11May 10, 2019Updated 6 years ago
- A python plugin integrated into Carla Simulator for emulate cyber-attack over the CAN-Bus (https://carla.org/)☆15Apr 26, 2021Updated 4 years ago
- Convert asciinema JSON files to GIF for embedding in Github, Medium, email, Slack and more!☆11Sep 24, 2020Updated 5 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- A Roku streaming device controller for the browser using a Go server to host the static content and run a proxy to get around the restric…☆10May 5, 2020Updated 5 years ago
- Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.☆17Oct 13, 2022Updated 3 years ago
- See https://www.meriac.com/dl/HID-iCLASS-security.pdf and https://events.ccc.de/congress/2010/Fahrplan/attachments/1784_HID-iClass-27C3.p…☆14Nov 26, 2017Updated 8 years ago
- Python tool to inject DLLs into processes☆11Jun 29, 2017Updated 8 years ago
- Unicorn Engine based running of SecureROM☆11Sep 13, 2022Updated 3 years ago
- ☆12Dec 12, 2022Updated 3 years ago
- Continuous functions formalized in Lean4. A students project accompanied by a YouTube video.☆17Jul 10, 2025Updated 7 months ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Jan 14, 2021Updated 5 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- ☆14Dec 2, 2021Updated 4 years ago
- ☆11Jun 8, 2022Updated 3 years ago
- Data-flow Analysis Visualizer☆10Dec 9, 2021Updated 4 years ago
- ☆11Mar 22, 2016Updated 9 years ago
- PoC for CVE-2025-48384☆20Jul 9, 2025Updated 7 months ago
- Extract Procedural Details of the TTP based on the actor mentioned in OSINT reportings☆13Feb 25, 2024Updated 2 years ago
- The latest available Source Engine source code, gathered from a variety of sources☆10Nov 13, 2017Updated 8 years ago
- An embedded key/value database for Go.☆11Feb 18, 2022Updated 4 years ago
- Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy☆11Jul 18, 2024Updated last year
- Various C programs I have created from the https://learncgames.com website☆12Mar 5, 2021Updated 4 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 5 years ago
- An open-source software based testing framework for automotive cybersecurity☆12Jul 14, 2023Updated 2 years ago
- ☆11Mar 16, 2016Updated 9 years ago