Rapid Assessment of Web Resources
☆19Nov 11, 2016Updated 9 years ago
Alternatives and similar repositories for rawr
Users that are interested in rawr are comparing it to the libraries listed below
Sorting:
- Parse nmap's XML output files and insert them into an SQLite database☆29Jun 5, 2017Updated 8 years ago
- Parser to convert BURP Pro .XML to .CSV and build a Word .Docx Template☆14Dec 8, 2021Updated 4 years ago
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago
- ☆17Mar 15, 2018Updated 7 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- A secure way to code via Signal. Integrates long-term memory, ralph-style looping for complex specifics, and more all from your phone.☆138Updated this week
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆140Apr 29, 2020Updated 5 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆22Jul 31, 2025Updated 7 months ago
- A magnet u-joint arms and effector for the Rostock delta 3d printer.☆20May 31, 2013Updated 12 years ago
- To use a HackRF to capture the communication between a receiver and quad copter and control the quad copter from a hackRF☆39May 6, 2019Updated 6 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- Example of using Gauge and OWASP ZAP for test automation☆11Jan 9, 2020Updated 6 years ago
- ☆31Jan 22, 2026Updated last month
- This is a simple Powershell script that can be used to install a windows .MSI file(Software) without going through selecting and pressing…☆13Jul 5, 2019Updated 6 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Walkie Talkie with Arduino Nano and nRF24L01☆10Sep 16, 2022Updated 3 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Aug 30, 2018Updated 7 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- A greybox fuzzer for continuous integration☆10Dec 15, 2023Updated 2 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- ☆34Jan 22, 2026Updated last month
- ☆11Jan 16, 2018Updated 8 years ago
- vncsnapshot☆14Mar 23, 2012Updated 13 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- Insecure web application used to test system security controls☆13Oct 14, 2025Updated 4 months ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- ☆20Sep 6, 2025Updated 6 months ago
- F# Implementation to spawn shellcode☆47Jun 6, 2018Updated 7 years ago
- If these strings are in your code, you might have a problem!☆51Feb 13, 2026Updated 3 weeks ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- Generate word list by combining inputted words or by permutaing characters.☆14Nov 24, 2017Updated 8 years ago
- Universal Radio Hacker (urh) plugin to decode eQ-3/ELV/Technoline ETH Comfort/SDLC/HDLC messages☆14Jan 17, 2019Updated 7 years ago
- fully Undetectable payload generator for metasploit☆11Feb 1, 2023Updated 3 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Implementation Code of TextHoaxer☆15Aug 21, 2022Updated 3 years ago