PiRogueToolSuite / pirogue-osView external linksLinks
OS image for the PiRogue based on Debian 12
☆160Jul 23, 2024Updated last year
Alternatives and similar repositories for pirogue-os
Users that are interested in pirogue-os are comparing it to the libraries listed below
Sorting:
- Source of the project website☆25Feb 10, 2026Updated last week
- Exchange Online Protection & Microsoft Defender For Office 365 Hardering Tool☆12Jan 14, 2023Updated 3 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- Synchronize https certificates from LetsEncrypt or similar service to Aruba ClearPass (https/portal certificate).☆20Jul 12, 2025Updated 7 months ago
- Pwning IPv6 Networks☆37Dec 25, 2025Updated last month
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆25Jan 21, 2026Updated 3 weeks ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- ☆11Dec 26, 2023Updated 2 years ago
- HWR0's Shield Designs for the MorphESP 240 by @ccadic☆13Oct 7, 2021Updated 4 years ago
- transform a datapoint from a website into a CSV time-series dataset using the wayback machine☆12May 24, 2023Updated 2 years ago
- Materials used by Product Management and Product Marketing☆12Aug 5, 2018Updated 7 years ago
- Scripts to help and speed up reversing activities☆13Jan 12, 2026Updated last month
- Code and templates required to build the DARPA open catalog.☆17Mar 23, 2016Updated 9 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- Docker container with Apache 2 / CGI shellshock vulnerable.☆12Dec 18, 2017Updated 8 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- 3wifi fork☆11Aug 22, 2023Updated 2 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- ☆15Jun 21, 2023Updated 2 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Malware vulnerability intel tool for third-party attackers☆122Oct 24, 2024Updated last year
- vusialization of geo points from photos from vk profile☆48Feb 16, 2022Updated 4 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 8 years ago
- RAWRR is a multiplatform app that assists with note taking and report generation for security evaluations.☆18Feb 8, 2023Updated 3 years ago
- OSINT Intelligence for different areas ( useful for different type of investigations and learning etc)☆14May 20, 2020Updated 5 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- NSE script to detect ProxyOracle☆13Aug 30, 2021Updated 4 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 2 years ago
- ThePhish: an automated phishing email analysis tool☆1,328Aug 1, 2024Updated last year
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 2 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆16Oct 6, 2021Updated 4 years ago
- BlueHound - pinpoint the security issues that actually matter☆762Jul 12, 2023Updated 2 years ago