Simple Live Data Collection Tool
☆22Oct 4, 2020Updated 5 years ago
Alternatives and similar repositories for Simple-Live-Data-Collection
Users that are interested in Simple-Live-Data-Collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.☆40May 1, 2020Updated 5 years ago
- Use DNS to hunt for threats including DGAs☆15Jan 4, 2016Updated 10 years ago
- The project provides an automated deployment procedure for GNS3 server on a Google Compute Engine (GCE) VM instance.☆17Oct 1, 2020Updated 5 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- Simple source code security audit helper☆50Mar 25, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- ☆29Jul 4, 2020Updated 5 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Easy brute forcing to whatever you want - Jose Pino☆65Mar 23, 2015Updated 11 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- Linux Incident Response☆90Sep 22, 2019Updated 6 years ago
- The following repo holds all scripts, apps, and documentation for InfoSec Red Team related activities.☆19Jun 24, 2020Updated 5 years ago
- Some of my public exploits☆52Sep 15, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- powershell tool for VM evasion☆41Oct 2, 2020Updated 5 years ago
- Binary reversing tool to find all possible code paths between two functions.☆28Apr 25, 2018Updated 7 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Simple way to disable/rename buttons from a task manager☆30Feb 17, 2020Updated 6 years ago
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Jun 24, 2020Updated 5 years ago
- ☆16Jul 14, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Nov 13, 2021Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆83Mar 20, 2023Updated 3 years ago
- Takım arkadaşım Altay Şimşek ile birlikte Havelsan Ekspres Hackathonunda geliştirdiğimiz OpenVPN eklentisi.☆17May 20, 2022Updated 3 years ago
- Python script to hunt phishing kits☆138Jul 25, 2023Updated 2 years ago
- a exec jsp shell, simply like weevely php C/S shell.☆14Jun 21, 2022Updated 3 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Use md5-collisions to make evil executables looking like a good one.☆34Apr 23, 2020Updated 5 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- Human Resource Management System☆10Jul 31, 2021Updated 4 years ago
- Get notified instantly when your users of interest speak about something.☆10Mar 24, 2020Updated 6 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆84Feb 11, 2026Updated last month
- Maltego Local Transforms for truepeoplesearch.com☆12Jun 5, 2017Updated 8 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Mar 15, 2022Updated 4 years ago