OS image for the PiRogue based on Debian 12
☆160Jul 23, 2024Updated last year
Alternatives and similar repositories for pirogue-os
Users that are interested in pirogue-os are comparing it to the libraries listed below
Sorting:
- Source of the project website☆25Mar 9, 2026Updated last week
- Create and publish PiRogue images☆24May 3, 2025Updated 10 months ago
- Exchange Online Protection & Microsoft Defender For Office 365 Hardering Tool☆12Jan 14, 2023Updated 3 years ago
- Synchronize https certificates from LetsEncrypt or similar service to Aruba ClearPass (https/portal certificate).☆23Mar 3, 2026Updated 2 weeks ago
- Case, knowledge management and digital investigation platform☆32Feb 26, 2026Updated 3 weeks ago
- Scan a list of IPs quickly using multithreading☆45Jun 2, 2023Updated 2 years ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Mar 12, 2026Updated last week
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Active Directory Certificate Services☆25Jan 23, 2017Updated 9 years ago
- 'apk-yara-checker' is a little CLI tool written in Rust to check Yara rules against a folder of APK files.☆16Jul 6, 2024Updated last year
- Tool to collect information useful for MacOS troubleshooting in Intune environments☆26Nov 20, 2023Updated 2 years ago
- OSINT Intelligence for different areas ( useful for different type of investigations and learning etc)☆14May 20, 2020Updated 5 years ago
- ClearPass Exchange integration snippets☆26Aug 12, 2025Updated 7 months ago
- NSE script to detect ProxyOracle☆13Aug 30, 2021Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Scripts to help and speed up reversing activities☆13Jan 12, 2026Updated 2 months ago
- transform a datapoint from a website into a CSV time-series dataset using the wayback machine☆12May 24, 2023Updated 2 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- NO LONGER MAINTAINED - Android security & privacy analysis for the masses. 2026 Update incoming WIP☆291Feb 17, 2026Updated last month
- Indicators of stalkerware apps☆344Jan 27, 2026Updated last month
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Malware vulnerability intel tool for third-party attackers☆122Oct 24, 2024Updated last year
- Windows Scripts☆12Apr 2, 2020Updated 5 years ago
- Materials used by Product Management and Product Marketing☆12Aug 5, 2018Updated 7 years ago
- ☆44Jan 22, 2026Updated last month
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 7 months ago
- Static Token And Credential Scanner☆95May 8, 2023Updated 2 years ago
- SpyGuard is a forked and enhanced version of TinyCheck. SpyGuard's main objective is to detect signs of compromise by monitoring network …☆476Sep 14, 2024Updated last year
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- Log4j-Scanner with Bind-Receipt and custom hostnames☆18Dec 27, 2021Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Nov 19, 2024Updated last year
- c0r0n4con talk 12 april 2020☆23Apr 13, 2020Updated 5 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆110Oct 23, 2018Updated 7 years ago
- ☆14Sep 9, 2022Updated 3 years ago
- Unlocking Serverless Computing to Assess Security Controls☆262Mar 15, 2024Updated 2 years ago