Kenna Security API and Scripting Toolkit
☆34Apr 17, 2026Updated 2 weeks ago
Alternatives and similar repositories for toolkit
Users that are interested in toolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Defines the Replicated Platform Hands-On Labs powered by the Instruqt platform☆17Feb 24, 2026Updated 2 months ago
- MultiStep MCP That Returns CVE Information With EPSS Score☆13May 22, 2025Updated 11 months ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- ☆11Aug 7, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- multiple password 'asher using Python’s hashlib☆15Mar 24, 2021Updated 5 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- salt-workspace☆16Feb 1, 2026Updated 3 months ago
- Explainer for Schemeful Same-Site☆15Aug 6, 2020Updated 5 years ago
- Askaway Open Source☆12Jan 31, 2023Updated 3 years ago
- Repository to store the Threat Reports made by the McAfee Enterprise ATR Team☆10Oct 11, 2018Updated 7 years ago
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- ☆16Mar 19, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆27Mar 18, 2026Updated last month
- ☆28Aug 5, 2022Updated 3 years ago
- .NET Standard compatible Slack RTM client☆10Sep 14, 2022Updated 3 years ago
- Demo notes & scripts for Buoyant's mTLS workshop.☆20Jun 17, 2022Updated 3 years ago
- A Python script to list valid emails of GSuite accounts.☆16Feb 11, 2025Updated last year
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 15 years ago
- An MCP-capable intelligent Apple podcast transcription and summarization to markdown tool.☆29Feb 2, 2026Updated 3 months ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite. Not currently maintained -- see tduehr/buby☆28Apr 30, 2011Updated 15 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Nov 16, 2017Updated 8 years ago
- NVD API 2.0 client for CVE information☆14May 15, 2025Updated 11 months ago
- I'll post my custom shellcode I make here!☆22Oct 23, 2019Updated 6 years ago
- Application which generates SWID-Tags from Linux package managers like dpkg, rpm or pacman.☆16Sep 9, 2021Updated 4 years ago
- Atomist SDM to find exposed secrets in repos☆19Apr 23, 2019Updated 7 years ago
- A Custom Scanner for Burp☆31Mar 26, 2014Updated 12 years ago
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated 3 months ago
- Slide deck and demo code for my DEFCON 26 talk☆11Aug 17, 2018Updated 7 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Adds a Save Button when Summenote is used within a form☆12Dec 29, 2020Updated 5 years ago
- ☆15Oct 13, 2025Updated 6 months ago
- Quake Command-Line Application With Golang☆10Jul 20, 2023Updated 2 years ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆126May 9, 2023Updated 2 years ago
- A demonstration of a continuous integration pipeline focused on security testing☆31Oct 5, 2018Updated 7 years ago
- Interview questions for SOC Analyst, Sec Engineering, etc☆17Apr 27, 2024Updated 2 years ago
- Adama - Command and Invoker Pattern For Getting Things Done☆13Aug 10, 2023Updated 2 years ago