A secure way to code via Signal. Integrates long-term memory, ralph-style looping for complex specifics, and more all from your phone.
β115Updated this week
Alternatives and similar repositories for nightwire
Users that are interested in nightwire are comparing it to the libraries listed below
Sorting:
- Use a LLM to create the ultimate Leek AI for Leek Wars! π₯¬β16May 2, 2024Updated last year
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COMβ20Jul 19, 2025Updated 7 months ago
- Automatic Sender Policy Framework Reconnaissanceβ19Jul 9, 2018Updated 7 years ago
- .Net assembly code depency inspectorβ36Dec 10, 2018Updated 7 years ago
- A schema language for JSON documents that allows validation and compilation into various database enginesβ40Jan 23, 2025Updated last year
- A thin async wrapper for SQLAlchemy sessionsβ10Sep 13, 2021Updated 4 years ago
- System Validation Platformβ12Sep 18, 2025Updated 5 months ago
- Material for a tutorial on Bayesian analysis of survey dataβ12Dec 30, 2025Updated 2 months ago
- β42Jul 23, 2025Updated 7 months ago
- β16Nov 30, 2025Updated 3 months ago
- AlienVault Open Threat Exchange App For Splunkβ10May 6, 2014Updated 11 years ago
- β11Jul 10, 2024Updated last year
- A C++ PMU and/or PDC Stream Simulator for IEEE C37.118.2β12May 21, 2019Updated 6 years ago
- Lazy SPL to detect Spring4Shell exploitationβ12Jul 8, 2022Updated 3 years ago
- OWASP Threat Dragon core filesβ11Jan 26, 2026Updated last month
- β11Dec 30, 2025Updated 2 months ago
- Cisco Meraki CMX WiFi Presence receiverβ12Apr 17, 2019Updated 6 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.β97Apr 13, 2023Updated 2 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and cβ¦β17Dec 29, 2013Updated 12 years ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysisβ11Jul 16, 2024Updated last year
- GUI and command line application for downloading large data volumes from PI Historianβ11Nov 8, 2023Updated 2 years ago
- π Hunt down social media accounts by username across social networksβ10Jan 24, 2023Updated 3 years ago
- β14Feb 16, 2023Updated 3 years ago
- A list of CVE's with Proof of Conceptsβ11Jun 17, 2021Updated 4 years ago
- Example code and files for the MyoWareβ’ Bionic 3D Printed Claws tutorialβ13May 26, 2015Updated 10 years ago
- A platform for property owners to manage and track tenant, property, maintenance and financial information.β11Jul 6, 2018Updated 7 years ago
- β10Jan 22, 2025Updated last year
- β12Sep 18, 2015Updated 10 years ago
- π» A Mand Mobile project example for Nuxtβ11Jan 4, 2023Updated 3 years ago
- Easily set Mac Retina display to higher unsupported resolutionsβ12Feb 5, 2023Updated 3 years ago
- Set of tools for meshtastic network visualization and analysis using a graph theory libraryβ15Feb 28, 2025Updated last year
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key filesβ14Jan 10, 2026Updated last month
- This is the latest version of BinHunter paperβ13Apr 13, 2025Updated 10 months ago
- A CommonJS library for working with Common Vulnerability Scoring System vectors and scores.β12Jul 14, 2022Updated 3 years ago
- Repo for the testing-genai workshopβ13May 8, 2025Updated 9 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flowβ18Jun 26, 2025Updated 8 months ago
- β12Mar 17, 2025Updated 11 months ago
- Injection of MSIL using Cecilβ12Jul 28, 2015Updated 10 years ago
- β11Jan 28, 2025Updated last year