Security stuff for iac scripts
☆16Apr 25, 2020Updated 5 years ago
Alternatives and similar repositories for IacSec
Users that are interested in IacSec are comparing it to the libraries listed below
Sorting:
- ☆17Oct 5, 2020Updated 5 years ago
- ☆37Jun 1, 2022Updated 3 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated last month
- Structured Information on State and Evolution of Dockerfiles - Online Appendix☆10Mar 16, 2018Updated 7 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- ☁️ My Cloud Projects, Docs/Write-ups☆11Jul 8, 2023Updated 2 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- QEMU support for a custom board based on a Microchip ATSAMD21G18A microcontroller (MCU)☆14Jun 10, 2024Updated last year
- Mad (╯°□°)╯'ing☆10Nov 22, 2022Updated 3 years ago
- Projeto web construído durante o NLW#04 com a Rocketseat/Diego Fernandes. MOVEIT: "Gerenciando o seu tempo para uma melhor produtividade"…☆10Oct 29, 2021Updated 4 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 7 months ago
- ☆14Sep 1, 2024Updated last year
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- ☆11Dec 26, 2023Updated 2 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- ☆11Jul 15, 2024Updated last year
- ☆32Jan 20, 2016Updated 10 years ago
- USB Host HID Keyboard Class for AT SAM D21 microcontroller☆13Oct 7, 2018Updated 7 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Mar 21, 2016Updated 9 years ago
- ☆14Sep 24, 2012Updated 13 years ago
- A Vue App for quickly generating KML Search Grids☆13Nov 12, 2024Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Kentico <=12.0.14 is vulnerable to a remote code execution via the SyncServer☆10Sep 28, 2020Updated 5 years ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year
- OWASP Foundation Web Respository☆11Jan 14, 2026Updated last month
- ☆11Nov 22, 2022Updated 3 years ago
- ☆12Mar 24, 2018Updated 7 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- The Super Vulnerable Java Application (SVJA), as demonstrated in the Roniel and DaRon Podcast Show, is an Apache Struts application desig…☆13Jan 1, 2026Updated 2 months ago
- ☆12Nov 2, 2015Updated 10 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago