Small Node CLI tool to extract active contributors on repos and orgs
☆10Dec 6, 2022Updated 3 years ago
Alternatives and similar repositories for github-stats
Users that are interested in github-stats are comparing it to the libraries listed below
Sorting:
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- A platform to help security researchers develop and test machine learning-based security services based on time-series data, with the abi…☆18Apr 9, 2019Updated 6 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆32Feb 16, 2026Updated last week
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Nov 22, 2022Updated 3 years ago
- This plugin provides dependency metadata for Docker images☆36Updated this week
- ☆12Nov 11, 2025Updated 3 months ago
- ❄️ Research project for SubFinder core API V2☆34Dec 30, 2018Updated 7 years ago
- A script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER ma…☆36Aug 7, 2025Updated 6 months ago
- IT Risk Management tools☆14Apr 4, 2025Updated 10 months ago
- A Linux extension that adds support to the /etc/resolver/[suffix].☆43Nov 10, 2017Updated 8 years ago
- A home internet server configuration for the BeagleBone Black, Raspberry Pi or Cubieboard☆10Jun 16, 2014Updated 11 years ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- ☆10Oct 2, 2021Updated 4 years ago
- A library and tool for querying, executing and exporting TR-064 devices and services☆10Apr 4, 2018Updated 7 years ago
- ☆10Nov 30, 2020Updated 5 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆41Aug 2, 2018Updated 7 years ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 3 months ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Pipe stuff to Neo4j☆10Jun 4, 2020Updated 5 years ago
- A simple SMTP Mass mailer program utilising open relays.☆10Aug 1, 2016Updated 9 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- Genrates python dependency graph☆22Aug 10, 2018Updated 7 years ago
- ☆11Oct 30, 2019Updated 6 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Updated this week
- Docker image for Apache Derby. This image is no longer mainained.☆10Dec 8, 2023Updated 2 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- ☆10Jan 14, 2015Updated 11 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- ☆15Feb 1, 2023Updated 3 years ago
- token exchange as a service☆11Updated this week
- ☆10Jan 22, 2016Updated 10 years ago
- A broker system between a public service and a private service☆112Updated this week
- A static website template for security pages.☆54Jul 19, 2025Updated 7 months ago
- Home of code related to security of network systems.☆25Jan 22, 2025Updated last year
- Dataset fingerprinting for AIBOM☆15Feb 18, 2026Updated last week