A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.
☆13Oct 31, 2021Updated 4 years ago
Alternatives and similar repositories for ginger
Users that are interested in ginger are comparing it to the libraries listed below
Sorting:
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆19Aug 11, 2022Updated 3 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆25Aug 1, 2022Updated 3 years ago
- Daily dump of domains in the .ch zonefile☆30Updated this week
- A collection of presentations and other contributions I have made to conferences.☆36Sep 9, 2024Updated last year
- ☆10Jan 30, 2022Updated 4 years ago
- Express API documentation generator☆10Jul 19, 2019Updated 6 years ago
- Random experiments and shenanigans☆13Dec 6, 2025Updated 3 months ago
- Source code for Hacker101.com - a free online web and mobile security class.☆16Apr 28, 2022Updated 3 years ago
- This repository includes some r2frida scripts to monitor iOS and Android Mobile apps.☆11Dec 21, 2021Updated 4 years ago
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- ☆13Dec 15, 2024Updated last year
- Qui puoi trovare i comandi aggiornati per l'uso con Debian 11. Se hai acquistato il libro prima del 2022 probabilmente sei nel posto gius…☆14Jan 11, 2023Updated 3 years ago
- a exec jsp shell, simply like weevely php C/S shell.☆14Jun 21, 2022Updated 3 years ago
- Notes some analysis related to VidarStealer sample☆16May 5, 2024Updated last year
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago
- gozero: the wannabe zero dependency runtime for Go developers (experimental)☆25Mar 7, 2026Updated last week
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- Magisk Plugin for Updating iptables When Proxy Changes☆11Mar 17, 2025Updated last year
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Jul 9, 2025Updated 8 months ago
- intelligent and automatic build system for C☆15Apr 17, 2021Updated 4 years ago
- ☆12Jun 5, 2024Updated last year
- red-tldr is a lightweight text search tool, which is used to help red team staff quickly find the commands and key points they want to ex…☆238Mar 3, 2026Updated 2 weeks ago
- seprmvr64, downgrade&jailbreak utility☆28Jun 7, 2024Updated last year
- A small script to send messages anonymously. very fast and secure SMS sending script.☆17Jul 7, 2021Updated 4 years ago
- Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API☆91Jan 9, 2023Updated 3 years ago
- encrypted-linux-kernel-modules☆12Nov 4, 2020Updated 5 years ago
- Experiments, snippets and other things related to Binary Ninja☆17Oct 22, 2024Updated last year
- ☆12Jan 13, 2018Updated 8 years ago
- Libro sulla consapevolezza della sicurezza informatica, scritto in italiano e totalmente in creative commons☆17Jan 27, 2026Updated last month
- A Python Library designed to facilitate interaction with Synack's undocumented API endpoints☆25Mar 4, 2025Updated last year
- Subdomain finder☆10Mar 13, 2025Updated last year
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- ☆11Mar 2, 2023Updated 3 years ago
- ☆45Jun 23, 2020Updated 5 years ago
- Convert GnuPG private keys to Tor hidden service keys (and vice versa)☆12Jun 11, 2015Updated 10 years ago
- A graphical user interface for Magic Wormhole file transfer☆13May 17, 2022Updated 3 years ago
- A simple TCP and UDP portscanner written in Go☆15Nov 11, 2022Updated 3 years ago
- A collection of weaponized LPE exploits written in Go☆53Jan 23, 2025Updated last year
- Obfuscator LLVM Binaries☆13Feb 10, 2021Updated 5 years ago