A tool for auditing medical devices and healthcare infrastructure
☆22Dec 28, 2025Updated 4 months ago
Alternatives and similar repositories for medaudit
Users that are interested in medaudit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Free and open-source medical device discovery and identification☆38Apr 13, 2026Updated 3 weeks ago
- Proof of concept to test POODLE over TLS☆11Mar 13, 2015Updated 11 years ago
- A LinkedIn Scraper☆15Aug 20, 2018Updated 7 years ago
- This bunch of scripts will make your conky 'clicky' :)☆17Dec 1, 2015Updated 10 years ago
- Various things to share☆11Sep 22, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- Tool for inspecting Windows Phone applications☆28Jun 7, 2013Updated 12 years ago
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Aug 4, 2023Updated 2 years ago
- Quickly identify the ownership of hosts to identify scope during penetration tests☆13Apr 24, 2026Updated 2 weeks ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Jun 24, 2020Updated 5 years ago
- ☆36Jan 4, 2026Updated 4 months ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- PoC☆12Apr 7, 2025Updated last year
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 7 years ago
- support for embedding graphviz graphs inside markdown documents☆27Jan 16, 2010Updated 16 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Oct 21, 2020Updated 5 years ago
- A talk+workshop on Accelerating Your Security Learning in 2017 given at null Bangalore 2017☆13Jan 23, 2017Updated 9 years ago
- Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)☆16Nov 23, 2023Updated 2 years ago
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated 3 months ago
- intelligent and automatic build system for C☆15Apr 17, 2021Updated 5 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- ☆11Jul 15, 2024Updated last year
- ☆12Jan 13, 2018Updated 8 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- Convert GnuPG private keys to Tor hidden service keys (and vice versa)☆12Jun 11, 2015Updated 10 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- Browser based Privacy Aware SBoM Exploration☆34May 2, 2026Updated last week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- Lightweight Python API for ThePirateBay☆18Dec 4, 2021Updated 4 years ago
- Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing☆32Jun 6, 2024Updated last year
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Md5 碰撞生成实现,去掉了boost依赖,简化编译☆12Jan 25, 2018Updated 8 years ago
- 股市資料一把抓,由軟體協助選股、買進和賣出訊號分析,節省研究時間!Capture stock market data and analyze stock selection, buy and sell signals with software assistance to …☆12Oct 27, 2025Updated 6 months ago
- Golang VNC screenshot utility☆13Feb 19, 2018Updated 8 years ago