Orange-OpenSource / decretLinks
DEbian Cve REproducer Tool
☆27Updated last month
Alternatives and similar repositories for decret
Users that are interested in decret are comparing it to the libraries listed below
Sorting:
- ☆55Updated last year
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆59Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆66Updated last year
- ☆116Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated 2 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆37Updated last month
- ☆51Updated 6 months ago
- Provides an overview of the inner file structure of a PDF☆25Updated 3 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆61Updated 6 months ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆94Updated 3 months ago
- PCAP visualization tool☆104Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆43Updated 2 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆94Updated 3 years ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated 8 months ago
- A curated list of argument injection vectors☆41Updated last year
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆36Updated 3 years ago
- An Evil OIDC Server☆54Updated 3 years ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆70Updated last month
- Sandbox samples and monitor them with kunai☆29Updated 7 months ago
- ☆60Updated 2 years ago
- Tools that trigger False Positive AV alerts☆53Updated last year
- A detailed repository of vulnerabilities that I discovered in The Squid Caching Proxy.☆23Updated last year
- Linux #rootkit and #malware revealer☆30Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 4 years ago
- Automated vulnerability discovery and annotation☆68Updated last year
- A VS Code extension to preview XML nmap output☆43Updated 11 months ago
- ☆18Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Updated last year