OpenResume is a powerful open-source resume builder and resume parser. https://open-resume.com/
☆41Jun 26, 2023Updated 2 years ago
Alternatives and similar repositories for open-resume
Users that are interested in open-resume are comparing it to the libraries listed below
Sorting:
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- ☆38Apr 7, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated last year
- BYOVD collection☆24Mar 20, 2024Updated last year
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- ☆28Apr 4, 2023Updated 2 years ago
- M365 Defender SOC Playbooks☆24Feb 6, 2023Updated 3 years ago
- Android Tasker scripts to use Android Tablet or other device as Car Media and Navigation center☆10Aug 6, 2014Updated 11 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- Garudaastra Tool is based on python3 to find cameras around the world☆28Jun 29, 2023Updated 2 years ago
- Repository for archiving Cobalt Strike configuration☆36Feb 28, 2026Updated last week
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Sep 20, 2024Updated last year
- A simple virtual lab builder/player☆36Feb 26, 2026Updated last week
- I have documented all of the AMSI patches that I learned till now☆73Nov 4, 2025Updated 4 months ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- Find DLLs with RWX section☆79Jul 3, 2023Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- ☆11Mar 20, 2024Updated last year
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Small tool to play with IOCs caused by Imageload events☆44May 14, 2023Updated 2 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated last month
- This Binary Ninja plugin is written in Python 3 and it aims to assist with reverse engineering and vulnerability research. It dumps the P…☆47Jan 28, 2023Updated 3 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- An Obsidian plugin to auto-populate data from Jira into a new Obsidian note☆13Aug 13, 2021Updated 4 years ago
- In accordance with survey reports, the growth of online business worldwide is significantly faster and higher in comparison with traditio…☆13Jul 30, 2023Updated 2 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- ☆15Aug 23, 2025Updated 6 months ago
- Work time summaries based on Windows boot, shutdown, sleep, and hibernation events.☆37Jan 4, 2026Updated 2 months ago
- Windows Monitoring Scripts based on Monitis API☆16Dec 8, 2016Updated 9 years ago
- ☆53Jul 9, 2013Updated 12 years ago
- This is a simple Powershell script that can be used to install a windows .MSI file(Software) without going through selecting and pressing…☆13Jul 5, 2019Updated 6 years ago
- ☆13Apr 2, 2023Updated 2 years ago
- Post-Infection Collection Toolkit☆95Jan 31, 2023Updated 3 years ago
- MouseButtonClicker clicks the mouse so you don't have to!☆13Jul 10, 2020Updated 5 years ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 9 months ago
- ☆11Aug 31, 2023Updated 2 years ago