anirudhduggal / medauditView external linksLinks
A tool for auditing medical devices and healthcare infrastructure
☆22Dec 28, 2025Updated last month
Alternatives and similar repositories for medaudit
Users that are interested in medaudit are comparing it to the libraries listed below
Sorting:
- A LinkedIn Scraper☆15Aug 20, 2018Updated 7 years ago
- ☆13Apr 26, 2016Updated 9 years ago
- Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)☆16Nov 23, 2023Updated 2 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- docker-compose bringing up multiple vulnerable applications inside containers.☆19Jan 29, 2018Updated 8 years ago
- A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements☆28Dec 18, 2022Updated 3 years ago
- VirtualBox Disk Image Encryption password cracker☆32Oct 6, 2015Updated 10 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Oct 21, 2025Updated 3 months ago
- ☆35Jan 4, 2026Updated last month
- Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing☆32Jun 6, 2024Updated last year
- Parse SDDL strings☆37Apr 1, 2024Updated last year
- ☆10Sep 24, 2021Updated 4 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- ☆10Mar 11, 2024Updated last year
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- A block-based programming environment for Arduino.☆16Jan 12, 2026Updated last month
- ☆10Mar 6, 2023Updated 2 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆106Feb 19, 2022Updated 3 years ago
- ☆34Oct 1, 2019Updated 6 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- DrayTek Vigor password recovery, config & firmware tools☆11Jul 18, 2015Updated 10 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- This repository is related to specialized books published by the THB team.☆20Aug 13, 2025Updated 6 months ago
- SSE to Stdio MCP Proxy Server☆17Jun 9, 2025Updated 8 months ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Jan 14, 2021Updated 5 years ago
- GET-ACQ is a python tool used to gather all companies acquired by a given company domain name. It is done by calling SecurityTrails API.☆12Nov 10, 2021Updated 4 years ago
- ☆11Jul 15, 2024Updated last year
- Simple read/write and commentable config files for go☆11Jul 2, 2016Updated 9 years ago
- Extract Procedural Details of the TTP based on the actor mentioned in OSINT reportings☆13Feb 25, 2024Updated last year
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- Verify and decrypt .NET's .ASPXAUTH cookie from node.☆12Jul 18, 2023Updated 2 years ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- Get started on the PicoCalc using the Pico-Series C/C++ SDK.☆27Jan 31, 2026Updated 2 weeks ago
- ☆11Mar 16, 2016Updated 9 years ago
- Various stuff and tweaks I have around Obsidian☆12Jun 20, 2025Updated 7 months ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago