OpenResume is a powerful open-source resume builder and resume parser. https://open-resume.com/
☆41Jun 26, 2023Updated 2 years ago
Alternatives and similar repositories for open-resume
Users that are interested in open-resume are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- ☆38Apr 7, 2023Updated 2 years ago
- A multi-agent SOC/DFIR assistant powered by LangChain, LangGraph, and OpenAI models. Automates IOC extraction, MITRE ATT&CK mapping, CVE …☆69Mar 19, 2026Updated last week
- ☆19Dec 18, 2024Updated last year
- Interactive Shells like PsExec, but in Go☆16Apr 30, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 9 months ago
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆63Mar 11, 2026Updated 2 weeks ago
- Produces random guitar exercises☆15Mar 8, 2026Updated 3 weeks ago
- ☆18Mar 26, 2024Updated 2 years ago
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Oct 21, 2024Updated last year
- Find DLLs with RWX section☆79Jul 3, 2023Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Sep 20, 2024Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- BYOVD collection☆24Mar 20, 2024Updated 2 years ago
- ☆13Aug 11, 2018Updated 7 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- I have documented all of the AMSI patches that I learned till now☆73Nov 4, 2025Updated 4 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆26Sep 29, 2018Updated 7 years ago
- ☆11Mar 20, 2024Updated 2 years ago
- ❄️ generate a static website from a dynamic one☆12Aug 22, 2018Updated 7 years ago
- My talks...☆25Feb 27, 2025Updated last year
- take a list of resolved subdomains and output any corresponding CNAMES en masse.☆18Jan 29, 2026Updated 2 months ago
- Detection Rule License (DRL)☆21Dec 27, 2024Updated last year
- A Tool for Domain Flyovers☆18Nov 12, 2019Updated 6 years ago
- App for tracking college bunks.☆54Apr 17, 2017Updated 8 years ago
- Script to add grml (from grml.org) and more stuff to a USB key☆12Dec 20, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆224Oct 22, 2023Updated 2 years ago
- Various android tools from Lingnu Open Source Consulting Ltd.☆14Mar 5, 2013Updated 13 years ago
- Python tool for converting from joy format to JA3 format SSL/TLS hashes☆11Jun 3, 2020Updated 5 years ago
- Top passwords as per HaveIBeenPwned☆33Mar 12, 2026Updated 2 weeks ago
- Elastic Security Labs' malware analysis and reverse engineering library☆53Mar 10, 2026Updated 2 weeks ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year