Simple and efficient file shredding
☆14Sep 23, 2019Updated 6 years ago
Alternatives and similar repositories for Corrupt
Users that are interested in Corrupt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Experiments on the Windows Internals☆31Sep 22, 2019Updated 6 years ago
- ☆23Jun 28, 2025Updated 9 months ago
- ☆34Jun 13, 2023Updated 2 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Nov 6, 2023Updated 2 years ago
- ☆27Feb 3, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆17Aug 27, 2022Updated 3 years ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆49Dec 18, 2024Updated last year
- automating the zig release process☆11Nov 19, 2025Updated 4 months ago
- CVE-2025-31324, SAP Exploit☆25Apr 28, 2025Updated 11 months ago
- ☆12Oct 10, 2023Updated 2 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- https://codeberg.org/ccxvii/djvudec☆14Aug 13, 2025Updated 7 months ago
- Duplicate not owned Token from Running Process☆73Jul 21, 2023Updated 2 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆17Nov 7, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A DFVFS Backed Forensic Viewer☆42Apr 13, 2020Updated 5 years ago
- A command line tic-tac-toe game in Golang☆12Oct 14, 2024Updated last year
- ☆11May 13, 2024Updated last year
- An automated e-mail OSINT tool☆23Apr 23, 2022Updated 3 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Nov 11, 2020Updated 5 years ago
- managed debugger for IronPython☆31Apr 8, 2009Updated 17 years ago
- A Model Context Protocol (MCP) server that integrates Volatility 3 memory forensics framework with Claude☆36Jul 7, 2025Updated 9 months ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- ☆17Aug 19, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- Active DIrectory Lab for Pentesting Practice☆25Aug 9, 2022Updated 3 years ago
- ☆17May 28, 2022Updated 3 years ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆11May 12, 2022Updated 3 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- ☆12Jun 5, 2024Updated last year
- A tool for fetching DFIR and other GitHub tools.☆27Aug 2, 2025Updated 8 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆152Jan 25, 2026Updated 2 months ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Filesystem interaction via firebeam virtual machine execution☆49Mar 26, 2026Updated 2 weeks ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆48Apr 7, 2025Updated last year
- A tool for generating efficient and accurate Hunspell dictionaries for Turkic languages☆19Apr 1, 2015Updated 11 years ago
- Svelte component for Material Design Icons☆13Jul 4, 2022Updated 3 years ago