French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.
☆72Oct 24, 2025Updated 4 months ago
Alternatives and similar repositories for french-ezines
Users that are interested in french-ezines are comparing it to the libraries listed below
Sorting:
- ☆23Apr 11, 2024Updated last year
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 8 months ago
- Set of tools to analyze Tinynuke samples☆15Nov 18, 2021Updated 4 years ago
- Golang Library to interact with your MISP instance☆22Sep 12, 2019Updated 6 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- ☆15Oct 29, 2024Updated last year
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- The official repository of PowersheLLM, a model for Powershell maliciousness detection using fine-tuned LLM☆13Jun 6, 2024Updated last year
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Mar 4, 2021Updated 5 years ago
- PyRASP is a Runtime Application Self Protection package for Python-based Web Servers (Flask, FastAPI and Django), Serverless Functions (A…☆33Nov 15, 2025Updated 3 months ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆11Aug 9, 2018Updated 7 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- ☆20Feb 6, 2024Updated 2 years ago
- PoC for extracting office files into PDF file metadata☆11Sep 11, 2019Updated 6 years ago
- 5 cves of ntp 4.2.8p15 founded by me.☆12Apr 11, 2023Updated 2 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Rapports techniques de VIGINUM☆36Sep 15, 2025Updated 5 months ago
- PoC compilation of libyara into WASM, for potential future CyberChef integration☆14Sep 18, 2022Updated 3 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- ☆21Jun 20, 2025Updated 8 months ago
- Automated Firebase security scanner to check for unauthorized read and write access on firestore, realtime databases, storage buckets and…☆41Oct 4, 2025Updated 5 months ago
- ☆18Sep 14, 2023Updated 2 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆23Updated this week
- Simple tmux session management.☆16Dec 16, 2023Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Like Russian roulette, but for your kernel.☆14Jul 13, 2025Updated 7 months ago
- A Wireshark dissector for Bluetooth Low Energy (BLE) advertisement packets of Apple Continuity, Microsoft CDP and Garmin proprietary prot…☆17Mar 13, 2020Updated 5 years ago
- Kerberoast Detection Script☆30Oct 31, 2024Updated last year
- ☆99Jun 22, 2025Updated 8 months ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated last month
- ☆93Dec 15, 2025Updated 2 months ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 4 years ago