Rapid Assessment of Web Resources
☆19Nov 11, 2016Updated 9 years ago
Alternatives and similar repositories for rawr
Users that are interested in rawr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Parser to convert BURP Pro .XML to .CSV and build a Word .Docx Template☆14Dec 8, 2021Updated 4 years ago
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago
- ☆17Mar 15, 2018Updated 8 years ago
- ☆10Aug 21, 2024Updated last year
- Tools I use on red team engagements and more☆34Mar 14, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- vncsnapshot☆14Mar 23, 2012Updated 14 years ago
- Build a Jekyll blog in minutes, without touching the command line.☆16Dec 6, 2018Updated 7 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- GoPhishReport is a penetration testing and red teaming tool that creates custom phishing campaign reports for GoPhish phishing campaigns …☆13Mar 9, 2024Updated 2 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- Convert PDF files to images in various image formats.☆16Jun 1, 2022Updated 3 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- ☆20Sep 6, 2025Updated 7 months ago
- Python implementation of select MicroBurst scripts.☆15Aug 19, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- F# Implementation to spawn shellcode☆47Jun 6, 2018Updated 7 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆142Apr 29, 2020Updated 5 years ago
- DCZia DC31 Badge☆15Jul 12, 2025Updated 9 months ago
- Research on the various credentials databases that have been dumped.☆11Jan 31, 2018Updated 8 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Aug 30, 2018Updated 7 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 8 years ago
- Assists in mass exportation of Nessus scans☆19Apr 20, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Deception implementation through analysis of BloodHound data☆58Mar 30, 2026Updated 2 weeks ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- This is a simple Powershell script that can be used to install a windows .MSI file(Software) without going through selecting and pressing…☆13Jul 5, 2019Updated 6 years ago
- ☆28Jun 12, 2017Updated 8 years ago
- ☆13Jan 5, 2018Updated 8 years ago
- ☆46Jan 22, 2026Updated 2 months ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆26Jul 31, 2025Updated 8 months ago
- Minimalist cheat sheet for developpers to write secure code☆54Jul 17, 2020Updated 5 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Jun 15, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Powershell script to run and determine if a specific device has been patched for CVE-2019-0708. This checks to see if the termdd.sys fil…☆18Aug 28, 2019Updated 6 years ago
- ☆16May 6, 2015Updated 10 years ago
- The vulnerability management guide should help to breakdown vulnerability management process into a manageable repeatable cycles tailored…☆16Jul 23, 2020Updated 5 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- Python pyVmomi plugin for Icinga☆14Aug 23, 2018Updated 7 years ago
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Feb 11, 2025Updated last year
- An interactive Wardley Mapping resource site.☆16Oct 4, 2021Updated 4 years ago