An interactive CLI application for interacting with authenticated Jupyter instances.
☆55May 7, 2025Updated 9 months ago
Alternatives and similar repositories for vger
Users that are interested in vger are comparing it to the libraries listed below
Sorting:
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- ☆19Jan 31, 2025Updated last year
- ☆23Sep 20, 2024Updated last year
- CVE-2024-28995 POC Vulnerability Scanner☆13Jun 15, 2024Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆118Feb 7, 2024Updated 2 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- An AWS metadata enumeration tool by Plerion☆101Feb 12, 2024Updated 2 years ago
- docker env for ios research on a mac host☆28Jun 12, 2025Updated 8 months ago
- ☆20Feb 9, 2024Updated 2 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- ☆12Jul 4, 2024Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Lightweight LLM Interaction Framework☆407Updated this week
- ☆23Sep 12, 2024Updated last year
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Data Scientists Go To Jupyter☆68Mar 3, 2025Updated last year
- ☆29May 12, 2025Updated 9 months ago
- ☆13Mar 1, 2024Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 3 months ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆35Jan 25, 2026Updated last month
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- Artifact monitoring that ensures fairplay☆78Jan 29, 2025Updated last year
- Central repo for talks and presentations☆47Jul 23, 2024Updated last year
- ☆16Jul 17, 2024Updated last year
- Arxiv + Notion Sync☆20May 12, 2025Updated 9 months ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- ☆11Feb 8, 2022Updated 4 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- BS3: Block device in S3☆13Apr 19, 2022Updated 3 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago