A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.
☆13Oct 31, 2021Updated 4 years ago
Alternatives and similar repositories for ginger
Users that are interested in ginger are comparing it to the libraries listed below
Sorting:
- ☆10Jan 30, 2022Updated 4 years ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆19Aug 11, 2022Updated 3 years ago
- Daily dump of domains in the .ch zonefile☆30Updated this week
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆25Aug 1, 2022Updated 3 years ago
- A Python Library designed to facilitate interaction with Synack's undocumented API endpoints☆25Mar 4, 2025Updated 11 months ago
- Qui puoi trovare i comandi aggiornati per l'uso con Debian 11. Se hai acquistato il libro prima del 2022 probabilmente sei nel posto gius…☆14Jan 11, 2023Updated 3 years ago
- ☆35Mar 19, 2022Updated 3 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- A small script to send messages anonymously. very fast and secure SMS sending script.☆17Jul 7, 2021Updated 4 years ago
- Libro sulla consapevolezza della sicurezza informatica, scritto in italiano e totalmente in creative commons☆17Jan 27, 2026Updated last month
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆84Jan 12, 2026Updated last month
- A collection of presentations and other contributions I have made to conferences.☆36Sep 9, 2024Updated last year
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.☆98Mar 5, 2023Updated 2 years ago
- Profitable MT5 Expert Advisors☆21Updated this week
- Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API☆91Jan 9, 2023Updated 3 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Jul 9, 2025Updated 7 months ago
- Burp Bounty profiles☆80Jan 2, 2022Updated 4 years ago
- ☆12Dec 15, 2024Updated last year
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆11Aug 14, 2024Updated last year
- Misc stuff from internet☆12Nov 5, 2025Updated 3 months ago
- PHP底层内核源码分析和扩展开发☆11Oct 20, 2017Updated 8 years ago
- Quake Command-Line Application With Golang☆10Jul 20, 2023Updated 2 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Honeypot detection toolkit☆11Feb 10, 2026Updated 2 weeks ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- Threat Modelling Assets (STRIDE, DREAD, etc. cheat sheets)☆13Apr 16, 2020Updated 5 years ago
- AiCSA,Move to https://github.com/hktalent/AiCSA☆10Apr 3, 2023Updated 2 years ago
- CaDiCaL + neural glue variable predictions☆10Oct 21, 2020Updated 5 years ago
- Interesting papers☆11Jun 22, 2024Updated last year
- Windows Defender Bypass for Cobalt Strike v4.0 Powershell Payload☆10Aug 29, 2020Updated 5 years ago
- ☆11Dec 25, 2020Updated 5 years ago
- Express API documentation generator☆10Jul 19, 2019Updated 6 years ago
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- ☆12Feb 18, 2022Updated 4 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- Shadowsocks/ShadowsocksR 账号在线监控☆12Nov 25, 2018Updated 7 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Convert GnuPG private keys to Tor hidden service keys (and vice versa)☆12Jun 11, 2015Updated 10 years ago