a Machine Learning powered CSRF attacks finding tool
☆27Mar 8, 2019Updated 7 years ago
Alternatives and similar repositories for mitch
Users that are interested in mitch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malware Analysis (Zararlı Yazılım Analizi)☆33Aug 1, 2019Updated 6 years ago
- ☆11Jun 5, 2015Updated 10 years ago
- NextB的基于敏感哈希的恶意文件相似度比较工具(python版本)☆14Jan 20, 2022Updated 4 years ago
- Webcrawler to collect cookie data and usage purposes, built using OpenWPM.☆13Jun 3, 2023Updated 2 years ago
- Continuous build system used by Mono and Moonlight.☆34Apr 8, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆19Feb 1, 2016Updated 10 years ago
- ☆25Aug 13, 2020Updated 5 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 6 years ago
- LFI/RFI scanner by Iman Karim (fimap.dev@gmail.com)☆10Jul 3, 2015Updated 10 years ago
- PKCS#11 wrapper for Java☆10Jan 29, 2017Updated 9 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Apr 22, 2022Updated 4 years ago
- STMCTF17 Writeups☆36Nov 8, 2017Updated 8 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- https://twitch.com/scottsec adresinde yapılan yayınların arşiv, link ve kaynakların bulunduğu repo☆12Feb 1, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- A fuzzy parser for C/C++ that creates semantic code property graphs☆36Oct 15, 2020Updated 5 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- Example code to help getting start with SootUp☆15Aug 7, 2025Updated 8 months ago
- Our backup exploitation technique: fuzzing for POVs!☆25Aug 20, 2016Updated 9 years ago
- a crawler for apple AppStore☆19Nov 10, 2020Updated 5 years ago
- iOS Automation Framework iOS Touch Simulation Library☆14Nov 18, 2024Updated last year
- 实战攻击中的badusb脚本☆16Apr 6, 2020Updated 6 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- this repo contains required files for web application pentests☆194Dec 8, 2016Updated 9 years ago
- A xss target for practicing☆10Feb 22, 2017Updated 9 years ago
- eXpose deep neural network, detects malicious URLs, file paths and registry keys with proper training☆47Feb 13, 2018Updated 8 years ago
- generate yara-androguard report on your local and scan☆12Oct 3, 2019Updated 6 years ago
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- ☆16May 22, 2015Updated 10 years ago
- ☆29May 4, 2016Updated 10 years ago
- Ardupilot fork fordrone dance controller project by SPH Engineering☆15Sep 5, 2017Updated 8 years ago
- CVE-2021-40438 exploit PoC with Docker setup.☆12Oct 24, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Yet another IPython notebook to LaTeX converter - this one exports clean code easily absorbed in other reports.☆16Jun 1, 2023Updated 2 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- Scraping creds using Github API and truffleHog☆11Dec 13, 2023Updated 2 years ago
- Security methods for WeAkNess detection☆20Jan 26, 2026Updated 3 months ago
- 苹果的mdm服务实现 plist制作 mobliconfig签名☆17Apr 16, 2022Updated 4 years ago
- Triton based R2 plugin for concolic execution and total control☆35Nov 26, 2018Updated 7 years ago
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆45Jan 29, 2019Updated 7 years ago