RenanTKN / pylsbView external linksLinks
☆29Sep 2, 2020Updated 5 years ago
Alternatives and similar repositories for pylsb
Users that are interested in pylsb are comparing it to the libraries listed below
Sorting:
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- Cybersecurity Psychology Framework☆19Feb 8, 2026Updated last week
- AI-powered security code analysis and vulnerability scanner built with modern AI models and OWASP best practices.☆26Jul 6, 2025Updated 7 months ago
- Python infrastructure to train paths selectors for symbolic execution engines.☆11Updated this week
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 9 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- ☆13Jan 26, 2024Updated 2 years ago
- Tutorial for using WebGL with three.js.☆11Aug 30, 2017Updated 8 years ago
- PLUTO-GPS-SIM generates a GPS baseband signal IQ data stream, which is then transmitted by the software-defined radio (SDR) platform ADA…☆12Dec 27, 2021Updated 4 years ago
- Sample Random GitHub Repositories☆11Dec 27, 2025Updated last month
- ☆15Dec 1, 2025Updated 2 months ago
- ObjToPicoCAD-GUI a user-friendly graphical user interface (GUI) application written in C# that serves as a port for the original C++ scri…☆13Dec 3, 2024Updated last year
- Sprite Generator☆11Feb 24, 2022Updated 3 years ago
- The graffiti research lab L.A.S.E.R-TAG project☆12Sep 16, 2021Updated 4 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- psPAS Example scripts & code☆11Jul 19, 2020Updated 5 years ago
- ☆12Oct 22, 2023Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆15Jun 22, 2024Updated last year
- This program takes an image (png, jpg, jpeg) and turns it into ascii art. it can produce still images, animations and loops.☆10Oct 3, 2023Updated 2 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- this is a tcl script for unpacking bitrock packed archives☆16Sep 27, 2020Updated 5 years ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆26Jul 11, 2025Updated 7 months ago
- The Public Physical Pentesting Paraphernalia Project (P5) is a collection of 3D printing models, DIY tool instructions and entry-level me…☆12Sep 6, 2019Updated 6 years ago
- ☆10Sep 20, 2020Updated 5 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- ☆14Dec 27, 2020Updated 5 years ago
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Apr 13, 2019Updated 6 years ago
- Maltego Local Transform to use Hybrid Analysis Public API - https://www.hybrid-analysis.com/apikeys/info☆12Sep 7, 2018Updated 7 years ago
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated last year
- Use deep neural networks to synthesize the Neuroscore for evaluating Generative Adversarial Networks☆10Jun 1, 2020Updated 5 years ago
- Gerador de jogos lotofácil utilizando técnica das 14 dezenas fixas☆14Feb 18, 2014Updated 11 years ago
- Audit and test security vulnerabilities or simply wreak chaos upon your ROS system☆11Jul 12, 2018Updated 7 years ago
- HTTP based framework for building command and control components for remote access trojans☆15Aug 2, 2021Updated 4 years ago
- Welcome to Autoaudit, a log tampering detection tool.☆13Mar 19, 2024Updated last year
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- Security Blogs - A simple aggregator for security news/blog☆24Jan 19, 2026Updated 3 weeks ago