PiRogueToolSuite / pirogue-osView external linksLinks
OS image for the PiRogue based on Debian 12
☆160Jul 23, 2024Updated last year
Alternatives and similar repositories for pirogue-os
Users that are interested in pirogue-os are comparing it to the libraries listed below
Sorting:
- Source of the project website☆25Updated this week
- Create and publish PiRogue images☆23May 3, 2025Updated 9 months ago
- Case, knowledge management and digital investigation platform☆31Dec 2, 2025Updated 2 months ago
- ☆10Sep 24, 2021Updated 4 years ago
- Pwning IPv6 Networks☆37Dec 25, 2025Updated last month
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆25Jan 21, 2026Updated 3 weeks ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Jul 7, 2018Updated 7 years ago
- HWR0's Shield Designs for the MorphESP 240 by @ccadic☆13Oct 7, 2021Updated 4 years ago
- Code and templates required to build the DARPA open catalog.☆17Mar 23, 2016Updated 9 years ago
- Scripts to help and speed up reversing activities☆13Jan 12, 2026Updated last month
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- Docker container with Apache 2 / CGI shellshock vulnerable.☆12Dec 18, 2017Updated 8 years ago
- transform a datapoint from a website into a CSV time-series dataset using the wayback machine☆12May 24, 2023Updated 2 years ago
- Materials used by Product Management and Product Marketing☆12Aug 5, 2018Updated 7 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- ☆15Jun 21, 2023Updated 2 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆122Oct 24, 2024Updated last year
- vusialization of geo points from photos from vk profile☆48Feb 16, 2022Updated 4 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 8 years ago
- Log4j-Scanner with Bind-Receipt and custom hostnames☆18Dec 27, 2021Updated 4 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 2 years ago
- RAWRR is a multiplatform app that assists with note taking and report generation for security evaluations.☆18Feb 8, 2023Updated 3 years ago
- ThePhish: an automated phishing email analysis tool☆1,328Aug 1, 2024Updated last year
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆16Oct 6, 2021Updated 4 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- BlueHound - pinpoint the security issues that actually matter☆762Jul 12, 2023Updated 2 years ago
- Open-Source Intelligence Apparatus☆162Apr 22, 2024Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Aug 30, 2022Updated 3 years ago
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- Unlocking Serverless Computing to Assess Security Controls☆262Mar 15, 2024Updated last year