☆11Sep 15, 2017Updated 8 years ago
Alternatives and similar repositories for Web
Users that are interested in Web are comparing it to the libraries listed below
Sorting:
- ⏣ SecKCoin (SKC) is a cryptocurrency developed by SecKC.☆11Nov 16, 2019Updated 6 years ago
- ☆12Sep 17, 2020Updated 5 years ago
- Various Cobbler config files☆14Jan 23, 2013Updated 13 years ago
- ☆16Mar 6, 2019Updated 7 years ago
- A powershell based traffic generation scripts to simulate user activity via Internet Explorer☆15May 6, 2015Updated 10 years ago
- wireless client identification☆18Nov 26, 2014Updated 11 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15May 23, 2017Updated 8 years ago
- A Frida MCP server to enable autonomous AI assistance for Android instrumentation☆35Feb 8, 2026Updated last month
- Raspberry Pi compatible Docker image with Docker Swarm - https://github.com/docker/swarm☆15Oct 29, 2017Updated 8 years ago
- Purpose-built Red Team network hardware implant made from common components.☆28Mar 18, 2023Updated 3 years ago
- Proof of concept to test POODLE over TLS☆11Mar 13, 2015Updated 11 years ago
- OpenStack MITAKA Semi-Automated installer for Centos 7☆14Nov 19, 2016Updated 9 years ago
- This repository is for a beginners PowerShell training course I am holding in central Missouri.☆20May 17, 2017Updated 8 years ago
- Static Obfuscar Deobfuscator☆22Aug 31, 2019Updated 6 years ago
- Wolfenstein 3D (1992) by id Software, Inc. for DOS☆25Feb 6, 2012Updated 14 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Jun 2, 2016Updated 9 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- this is a demo set of attacks that can be used to get started with gauntlt☆27Dec 14, 2015Updated 10 years ago
- FreeSpace 2 (199) by Volition, Inc.☆36Jun 20, 2015Updated 10 years ago
- Simple, secure and composable I/O abstraction for construction of efficient computation workflows.☆10Jun 11, 2016Updated 9 years ago
- Old Repo. See https://github.com/jaybosamiya/matasano-crypto instead☆16Aug 2, 2015Updated 10 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- A Windows PowerShell & PowerShell Core Module to calculate a CVSS3 Score based on a Vector string☆12Dec 20, 2022Updated 3 years ago
- ☆11Feb 21, 2016Updated 10 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- Extra RHEL SELinux modules for OpenStack☆22Jan 7, 2026Updated 2 months ago
- Ansible role to set up dns in Debian-like systems☆10Jan 28, 2026Updated last month
- Welcome to Autoaudit, a log tampering detection tool.☆13Mar 19, 2024Updated 2 years ago
- Automating simple report creating of threat intelligence using ChatGPT and Greynoise API.☆10Oct 3, 2023Updated 2 years ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆11Jul 29, 2020Updated 5 years ago
- This repository contains data related to coronavirus & COVID-19 based domains identified by Swimlane's DeepDive research team☆11Jul 6, 2020Updated 5 years ago
- ☆10Mar 31, 2025Updated 11 months ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- UAVCAN is a lightweight protocol designed for reliable communication in aerospace and robotic applications via CAN bus.☆13Oct 16, 2024Updated last year
- SCL JAMF Pro Extension Attribute Collection☆17Feb 19, 2020Updated 6 years ago
- This repository contains all the talk materials and ebook from the talk System Hardening Using Ansible given at All Day DevOps 2016 onlin…☆12Nov 16, 2016Updated 9 years ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆26Oct 3, 2024Updated last year
- Assorted scripts for Bro☆12Feb 8, 2016Updated 10 years ago
- Bro Snippets☆21Nov 7, 2014Updated 11 years ago