Analyze assets authorization, who has access to what and how
☆76Mar 30, 2026Updated 3 weeks ago
Alternatives and similar repositories for universal-data-permissions-scanner
Users that are interested in universal-data-permissions-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆44Jan 18, 2025Updated last year
- Meeting materials☆24Apr 8, 2026Updated 3 weeks ago
- Machine-readable .txt blocklist of scam URLs and IP Addresses from the Global Anti Scam Organization (https://www.globalantiscam.org) web…☆34Apr 21, 2026Updated last week
- ☆14Mar 5, 2021Updated 5 years ago
- Browser extension for launching multi-platform OSINT queries from grouped YAML profiles.☆10Apr 25, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- Stupid Simple Detection Testing☆13Mar 7, 2024Updated 2 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- AirPlay server with AirTunes support☆21Apr 14, 2021Updated 5 years ago
- An ERC-1155 NFT contract for artists☆12Jan 15, 2021Updated 5 years ago
- Access to the undocumented Duke Energy usage API☆12Jan 27, 2021Updated 5 years ago
- Parsing Module of Microsoft SQL Server Transaction log☆12May 12, 2023Updated 2 years ago
- This is a sample solution that demonstrates how to use AWS IAM Identity Center with Neptune to visualize and map relationships between id…☆35Nov 27, 2025Updated 5 months ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆14Sep 11, 2023Updated 2 years ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- a compact set of python functions for creating many types of plots and data displays in SVG for use in web pages.☆12Mar 16, 2023Updated 3 years ago
- PowerShell provider for Dropbox☆13Mar 8, 2018Updated 8 years ago
- ☆75Mar 19, 2025Updated last year
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆37Mar 30, 2026Updated 3 weeks ago
- ShutNet, is a 'virus'(it is not) that will automaticly shut down every device connected.☆18Apr 15, 2023Updated 3 years ago
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- Entra ID Password Protection Banned Password Lists☆18Apr 16, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆45May 9, 2023Updated 2 years ago
- Tired of searching the web for stupid device identifiers? Join the club 🙄☆13Mar 30, 2026Updated 3 weeks ago
- OpenID Shared Signals and Events (SSE) / Continuous Access Evaluation Protocol (CAEP) / Risk Incident Sharing and Coordination (RISC) JSO…☆15Jun 7, 2024Updated last year
- Documentation for DFIR ORC, artefact collection tool dedicated to Microsoft Windows☆12Apr 10, 2026Updated 2 weeks ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Mar 27, 2026Updated last month
- This bit of code scans over a folder set in a variable, then e-mails a set address if there are permissions for individual users.☆11Sep 12, 2016Updated 9 years ago
- ChaCha20Poly1305 and XChaCha20Poly1305 AEAD implementations☆20Nov 24, 2020Updated 5 years ago
- 🗂️ ARCHIVED: Automated STIG Benchmark Compliance Remediation for Windows Server 2012 Member Server with Ansible☆13Dec 8, 2020Updated 5 years ago
- ☆83Nov 14, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Little developer/power tools.☆18Apr 25, 2024Updated 2 years ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆43Apr 3, 2026Updated 3 weeks ago
- Indicators of compromise☆17Jan 29, 2026Updated 3 months ago
- ☆13Sep 18, 2025Updated 7 months ago
- REplay is a reverse engineering playground that has 3 separate levels and acts as a fancy little playground mimicking real world reverse …☆16Apr 13, 2024Updated 2 years ago
- ☆21Jul 30, 2024Updated last year
- ☆18Nov 12, 2019Updated 6 years ago