Simple and efficient file shredding
☆14Sep 23, 2019Updated 6 years ago
Alternatives and similar repositories for Corrupt
Users that are interested in Corrupt are comparing it to the libraries listed below
Sorting:
- Experiments on the Windows Internals☆31Sep 22, 2019Updated 6 years ago
- ☆23Jun 28, 2025Updated 8 months ago
- ☆34Jun 13, 2023Updated 2 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Nov 6, 2023Updated 2 years ago
- ☆27Feb 3, 2026Updated last month
- ☆17Aug 27, 2022Updated 3 years ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆49Dec 18, 2024Updated last year
- FastVulnVerify is an advanced Python tool developed to quickly identify common vulnerabilities encountered during penetration testing and…☆36Sep 16, 2024Updated last year
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- CVE-2025-31324, SAP Exploit☆25Apr 28, 2025Updated 10 months ago
- ☆12Oct 10, 2023Updated 2 years ago
- An automated e-mail OSINT tool☆23Apr 23, 2022Updated 3 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- https://codeberg.org/ccxvii/djvudec☆14Aug 13, 2025Updated 7 months ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆17Nov 7, 2020Updated 5 years ago
- A DFVFS Backed Forensic Viewer☆42Apr 13, 2020Updated 5 years ago
- Duplicate not owned Token from Running Process☆73Jul 21, 2023Updated 2 years ago
- This repository contains information on the CVEs I found.☆52Mar 10, 2024Updated 2 years ago
- A command line tic-tac-toe game in Golang☆12Oct 14, 2024Updated last year
- Intelligence and Reconnaissance Package/Bundle installer.☆28Nov 11, 2020Updated 5 years ago
- A Model Context Protocol (MCP) server that integrates Volatility 3 memory forensics framework with Claude☆32Jul 7, 2025Updated 8 months ago
- ☆14Sep 23, 2023Updated 2 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆28Jan 29, 2024Updated 2 years ago
- Active DIrectory Lab for Pentesting Practice☆25Aug 9, 2022Updated 3 years ago
- ☆17May 28, 2022Updated 3 years ago
- ☆12Apr 5, 2025Updated 11 months ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Apr 27, 2023Updated 2 years ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 2 months ago
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆11May 12, 2022Updated 3 years ago
- A tool for fetching DFIR and other GitHub tools.☆26Aug 2, 2025Updated 7 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- Python module to extract Ascii, Utf8, and Unicode strings from binary data. Lightning fast wrapper around c++ compiled code.☆57Jun 20, 2025Updated 9 months ago
- Filesystem interaction via firebeam virtual machine execution☆34Updated this week
- Svelte component for Material Design Icons☆13Jul 4, 2022Updated 3 years ago
- Microsoft Network Service Fingerprinting Tool☆69Jan 2, 2026Updated 2 months ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago