An interactive CLI application for interacting with authenticated Jupyter instances.
☆55May 7, 2025Updated 10 months ago
Alternatives and similar repositories for vger
Users that are interested in vger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆118Feb 7, 2024Updated 2 years ago
- A utility to inspect, validate, sign and verify machine learning model files.☆67Feb 5, 2025Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- An AWS metadata enumeration tool by Plerion☆101Feb 12, 2024Updated 2 years ago
- ☆18May 6, 2023Updated 2 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Feb 1, 2024Updated 2 years ago
- ☆20Feb 9, 2024Updated 2 years ago
- autoredteam: code for training models that automatically red team other language models☆15Aug 9, 2023Updated 2 years ago
- Data Scientists Go To Jupyter☆68Mar 3, 2025Updated last year
- CVE-2024-28995 POC Vulnerability Scanner☆13Jun 15, 2024Updated last year
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated 2 years ago
- docker env for ios research on a mac host☆28Jun 12, 2025Updated 9 months ago
- ☆12Jul 4, 2024Updated last year
- A simple POC to expose Mythic as a MCP server☆73Mar 20, 2025Updated last year
- Python standalone tokenizer☆15Nov 12, 2015Updated 10 years ago
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- ☆23Sep 20, 2024Updated last year
- ☆19Jan 31, 2025Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- Python3 library for sophisticated timing attacks using Gaussian Mixture Model.☆22Apr 10, 2022Updated 3 years ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆35Jan 25, 2026Updated last month
- Central repo for talks and presentations☆47Jul 23, 2024Updated last year
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆181Dec 22, 2025Updated 3 months ago
- Arxiv + Notion Sync☆20May 12, 2025Updated 10 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆43Oct 30, 2024Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Dec 18, 2023Updated 2 years ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆87May 13, 2024Updated last year
- Linux CS bypass technique☆32Feb 4, 2025Updated last year