Tami 4 Edge / Edge+ API In Python
☆33Jun 8, 2024Updated last year
Alternatives and similar repositories for Tami4EdgeAPI
Users that are interested in Tami4EdgeAPI are comparing it to the libraries listed below
Sorting:
- ☆11Sep 12, 2022Updated 3 years ago
- A research notes about how to get benefits from Cython to be asynchronous beyond IO tasks☆11Feb 17, 2020Updated 6 years ago
- Activate Windows & Office 🔑☆13Jun 15, 2024Updated last year
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago
- Pine and Frida better together☆15Oct 30, 2024Updated last year
- Gain root privilege by exploiting CVE-2014-3153 vulnerability☆16Sep 27, 2018Updated 7 years ago
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆13Nov 24, 2020Updated 5 years ago
- CLI generator for Velociraptor offline collector☆16Oct 10, 2025Updated 4 months ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- ☆13May 21, 2021Updated 4 years ago
- A collection of small examples demonstrating various linker features☆12Dec 29, 2018Updated 7 years ago
- ☆12Feb 9, 2025Updated last year
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 6 years ago
- handle elevation using bedaisy.☆13Aug 17, 2020Updated 5 years ago
- This is an open source search engine built using redis and puppeteer☆11Oct 21, 2022Updated 3 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- lowlevel cyber course - riscv & i8086 competition☆11Jan 12, 2019Updated 7 years ago
- Repository to track community hardware, data and funding.☆12Apr 8, 2022Updated 3 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- Windows - Privilege Escalation Checklist☆20Aug 28, 2020Updated 5 years ago
- Useful cyber security and digital forensics resources☆15Oct 20, 2020Updated 5 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- a selection of the dumbest, most cursed code i can come up with☆11Aug 23, 2023Updated 2 years ago
- ☆12Apr 27, 2024Updated last year
- Rust generators implemented through async/await syntax☆12Sep 29, 2023Updated 2 years ago
- Hunt the windows Registry automatically using VQL☆13Jan 6, 2026Updated last month
- A demonstration of how page tables can be used to run arbitrary code in ring-0 and lead to a privesc. Uses CVE-2016-7255 as an example.☆11Jun 11, 2018Updated 7 years ago
- Kernel Cheat for Games that use Modern AntiCheat EAC, Vanguard, Battleye etc☆11Dec 2, 2023Updated 2 years ago
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 5 months ago
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- A dynamic, Flask-based web application providing a centralized interface for executing various open-source intelligence (OSINT) and cyber…☆38Sep 19, 2025Updated 5 months ago
- Apex Legneds Cheat For Free, Aimbot, ESP☆10Oct 9, 2024Updated last year
- MalBox is a quick and dirty setup to create a malware analysis VM☆14Aug 27, 2024Updated last year
- An academic Cyber Range☆21Feb 23, 2026Updated last week
- A good performance multithreaded HTTP REST server☆13May 7, 2021Updated 4 years ago
- A trivial raycaster using minifb for rendering/input☆10Jan 2, 2023Updated 3 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- Patch an Electron app to apply your own changes☆16Feb 19, 2026Updated last week
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago