urlyzer is a URL parsing analysis tool.
☆24Jul 27, 2024Updated last year
Alternatives and similar repositories for urlyzer
Users that are interested in urlyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interactive Shells like PsExec, but in Go☆16Apr 30, 2025Updated 11 months ago
- ☆11Jun 12, 2023Updated 2 years ago
- ☆22Aug 29, 2023Updated 2 years ago
- PowerShell module to help getting tokens using managed identities☆17Dec 29, 2024Updated last year
- Simulation of Akira Ransomware with Invoke-AtomicTest☆18Jul 10, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Azure AiTM Function PoC to phish Entra ID Credentials☆28Nov 21, 2025Updated 4 months ago
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.☆20Mar 13, 2024Updated 2 years ago
- A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing Sharp…☆85Apr 10, 2026Updated last week
- Solutions developed by the MDEASM Customer Experience Engineering (CxE) Go-To Production (GTP) team for Azure MDEASM☆29Feb 3, 2025Updated last year
- Generate test data that is not only realistic but also contextually meaningful☆28Jun 30, 2023Updated 2 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- Enumerate AWS cloud resources based on provided credential☆52May 11, 2022Updated 3 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆30Dec 1, 2023Updated 2 years ago
- LLM-based automated patch diffing☆99Sep 15, 2025Updated 7 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆45Apr 14, 2024Updated 2 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- AutoSpamEmailScan.ps1 is used to monitor a specific mailbox that enterprise users can forward suspicious spam emails to a specific mailbo…☆15Feb 25, 2023Updated 3 years ago
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Jan 23, 2026Updated 2 months ago
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 4 years ago
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆75Apr 11, 2026Updated last week
- ☆15Jul 20, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A library to make HTTP requests with the Windows winhttp API☆25Feb 8, 2024Updated 2 years ago
- ☆44Oct 11, 2023Updated 2 years ago
- ☆12Oct 24, 2022Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Jan 19, 2026Updated 3 months ago
- Eclectic ICS (Industrial Control Systems) Resources & References☆16May 7, 2021Updated 4 years ago
- A comprehensive guide on SSH penetration testing techniques and methodologies. Authored by Abhinav Sharma, founder and CEO of Global Offe…☆12Jul 1, 2023Updated 2 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆39Oct 30, 2024Updated last year
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆51Sep 22, 2025Updated 6 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Sep 20, 2024Updated last year
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆20Mar 24, 2022Updated 4 years ago
- Mirror network traffic from one interface to another on Windows☆25Feb 26, 2020Updated 6 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆346Feb 23, 2024Updated 2 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- This Module Helps to Scan a Commit History of a Repo for Leakage of Secrets☆15Apr 26, 2025Updated 11 months ago
- ☆12Mar 28, 2026Updated 3 weeks ago