Orange-OpenSource / decretLinks
DEbian Cve REproducer Tool
☆27Updated last week
Alternatives and similar repositories for decret
Users that are interested in decret are comparing it to the libraries listed below
Sorting:
- ☆116Updated 2 years ago
- ☆55Updated last year
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆59Updated 3 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆65Updated last year
- Tools for offensive security of NetBackup infrastructures☆42Updated 2 years ago
- Sandbox samples and monitor them with kunai☆29Updated 6 months ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆95Updated 3 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Provides an overview of the inner file structure of a PDF☆24Updated 3 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆37Updated last month
- Automated vulnerability discovery and annotation☆67Updated last year
- Tools that trigger False Positive AV alerts☆53Updated last year
- Linux #rootkit and #malware revealer☆30Updated last year
- singe's grep - a fast grep using single-file parallelism☆47Updated 3 years ago
- Detect and remove the presence of canary tokens☆24Updated 2 years ago
- ☆23Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last month
- ☆50Updated 5 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- Tail Certificate Transparency logs and extract hostnames☆126Updated 6 months ago
- ☆79Updated last year
- ☆18Updated 11 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- A curated list of argument injection vectors☆41Updated 11 months ago
- ☆64Updated last year
- Userland exec PoC to be used as attack vector technique☆93Updated 2 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆94Updated 3 years ago
- A VS Code extension to preview XML nmap output☆43Updated 10 months ago