Orange-OpenSource / decretLinks
DEbian Cve REproducer Tool
☆27Updated 3 months ago
Alternatives and similar repositories for decret
Users that are interested in decret are comparing it to the libraries listed below
Sorting:
- ☆55Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆78Updated 2 years ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆65Updated 11 months ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- ☆116Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- ☆49Updated 2 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆58Updated 2 years ago
- A detailed repository of vulnerabilities that I discovered in The Squid Caching Proxy.☆22Updated 11 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆94Updated last week
- All kinds of tiny shells☆58Updated 2 years ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆62Updated 5 months ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆27Updated 3 weeks ago
- Linux #rootkit and #malware revealer☆28Updated last year
- PCAP visualization tool☆104Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 2 years ago
- A VS Code extension to preview XML nmap output☆44Updated 8 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆59Updated 3 months ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆45Updated 2 years ago
- Userland exec PoC to be used as attack vector technique☆93Updated last month
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆68Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆35Updated 10 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 3 months ago
- ☆129Updated 2 months ago
- ☆17Updated 8 months ago
- WhiteBeam: Transparent endpoint security☆100Updated 2 years ago
- ☆26Updated last year