Lakshmi-sudheer / ReproNowView external linksLinks
An open source tool to capture screen and network instantly helping security engineers reproduce bugs
☆83Nov 27, 2020Updated 5 years ago
Alternatives and similar repositories for ReproNow
Users that are interested in ReproNow are comparing it to the libraries listed below
Sorting:
- A pure Javascript function doing real object hardcopy☆10Mar 1, 2023Updated 2 years ago
- a simple script to simulate random "cosmic ray" memory errors against a linux process☆13May 14, 2024Updated last year
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- ☆18Jan 31, 2025Updated last year
- ☆12May 9, 2017Updated 8 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Raudio is a music streaming server allowing users to stream files from a remote machine to any number of clients☆13Mar 31, 2022Updated 3 years ago
- SecuritySnack data that doesn't fit into a single tweet.☆43Dec 22, 2025Updated last month
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- ☆14Nov 21, 2022Updated 3 years ago
- Yet another IDA Pro real time syncing plugin☆16Mar 27, 2018Updated 7 years ago
- Convert gpsxml files to png files which can be opened in Qgis☆13Aug 16, 2016Updated 9 years ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Download pdbs from symbol servers and cache locally, parse symbol paths from env vars☆21Mar 7, 2025Updated 11 months ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- ☆14Feb 3, 2022Updated 4 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 4 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Just for funsies, virtual foregrounds in Zoom conference calls☆18May 5, 2020Updated 5 years ago
- An improved algorithm for large scale OS fingerprinting☆19Jun 12, 2018Updated 7 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 2 years ago
- everyone can fuzz h2☆24Mar 13, 2019Updated 6 years ago
- A cat that can't be piped. 🐱☆17Jan 8, 2022Updated 4 years ago
- ☆23Sep 12, 2024Updated last year
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Jun 21, 2025Updated 7 months ago
- ☆23Sep 20, 2024Updated last year
- ☆27Feb 6, 2022Updated 4 years ago
- ☆108Oct 14, 2021Updated 4 years ago
- LD_PRELOAD Linux rootkit (x86 & ARM)☆25Apr 8, 2019Updated 6 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Nov 19, 2023Updated 2 years ago
- Download all files and XML list in a public Amazon AWS S3 bucket.☆22Sep 11, 2023Updated 2 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Feb 21, 2023Updated 2 years ago
- Reverse engineer obfuscated JavaScript visually. Chain transforms, inspect AST changes, write reusable deobfuscation plugins.☆51Feb 4, 2026Updated last week