Network-Wizard-Money-Gang / EchosounderView external linksLinks
petit programme marrant
☆30Oct 12, 2025Updated 4 months ago
Alternatives and similar repositories for Echosounder
Users that are interested in Echosounder are comparing it to the libraries listed below
Sorting:
- Limier est un petit outil en CLI permettant de trouver un flux RSS quand il est planqué sur un site.☆19Aug 6, 2023Updated 2 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Gandcrab v5.2 decryption scripts☆16Jan 10, 2020Updated 6 years ago
- This tool emulates an EMV-CAP device, to illustrate the article "Banque en ligne : à la decouverte d'EMV-CAP" published in MISC, issue #5…☆35Oct 21, 2025Updated 3 months ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- A Qemu Proxmox Template builder project using Packer☆71Dec 5, 2025Updated 2 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- The greatest tool to ever grace the computers of this earth 💯☆30Feb 26, 2019Updated 6 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- recover Firefox and more browsers logins☆49Nov 23, 2021Updated 4 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated last week
- Specialized testing tool designed to identify vulnerabilities and bugs in OPC UA (Open Platform Communications Unified Architecture) impl…☆43Feb 4, 2026Updated last week
- ☆42Apr 5, 2025Updated 10 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 8 months ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated last month
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- ☆10May 12, 2022Updated 3 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 5 years ago
- ☆12Jul 14, 2025Updated 7 months ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated 2 weeks ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- CveXplore☆42Sep 12, 2025Updated 5 months ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Jul 9, 2022Updated 3 years ago
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Jan 16, 2026Updated 3 weeks ago
- ☆10Jan 28, 2026Updated 2 weeks ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆30Jan 13, 2026Updated last month
- ☆12Mar 24, 2018Updated 7 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Research code and scripts used in the Silburt et al. (2021) EMNLP 2021 paper 'FANATIC: FAst Noise-Aware TopIc Clustering'☆11Jul 6, 2023Updated 2 years ago
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago
- A more generic version of https://github.com/dataarts/armsglobe for visualizing source/destination data☆10Jul 5, 2016Updated 9 years ago
- OWASP Foundation Web Respository☆11Jan 14, 2026Updated last month
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago