A tool for auditing medical devices and healthcare infrastructure
☆22Dec 28, 2025Updated 2 months ago
Alternatives and similar repositories for medaudit
Users that are interested in medaudit are comparing it to the libraries listed below
Sorting:
- Proof of concept to test POODLE over TLS☆11Mar 13, 2015Updated 10 years ago
- A LinkedIn Scraper☆15Aug 20, 2018Updated 7 years ago
- ☆13Apr 26, 2016Updated 9 years ago
- Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)☆16Nov 23, 2023Updated 2 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- docker-compose bringing up multiple vulnerable applications inside containers.☆19Jan 29, 2018Updated 8 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements☆28Dec 18, 2022Updated 3 years ago
- VirtualBox Disk Image Encryption password cracker☆31Oct 6, 2015Updated 10 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated last month
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing☆32Jun 6, 2024Updated last year
- Automated Enumeration Script for Pentesting☆34Aug 14, 2020Updated 5 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆35Oct 21, 2025Updated 4 months ago
- Parse SDDL strings☆37Apr 1, 2024Updated last year
- ☆10Sep 24, 2021Updated 4 years ago
- Web shell generator and command line interface.☆85Oct 2, 2020Updated 5 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- ☆10Mar 6, 2023Updated 3 years ago
- A python plugin integrated into Carla Simulator for emulate cyber-attack over the CAN-Bus (https://carla.org/)☆15Apr 26, 2021Updated 4 years ago
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- ☆14Feb 19, 2023Updated 3 years ago
- ☆12Jul 4, 2024Updated last year
- A block-based programming environment for Arduino.☆16Jan 12, 2026Updated last month
- ☆10Mar 11, 2024Updated last year
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆107Feb 19, 2022Updated 4 years ago
- POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon☆105Mar 14, 2023Updated 2 years ago
- ☆34Oct 1, 2019Updated 6 years ago
- Reverse engineering UI for Frida and Android☆16Oct 10, 2023Updated 2 years ago
- DrayTek Vigor password recovery, config & firmware tools☆11Jul 18, 2015Updated 10 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Jan 14, 2021Updated 5 years ago
- Get started on the PicoCalc using the Pico-Series C/C++ SDK.☆28Jan 31, 2026Updated last month
- GET-ACQ is a python tool used to gather all companies acquired by a given company domain name. It is done by calling SecurityTrails API.☆12Nov 10, 2021Updated 4 years ago
- An open-source software based testing framework for automotive cybersecurity☆12Jul 14, 2023Updated 2 years ago
- Verify and decrypt .NET's .ASPXAUTH cookie from node.☆12Jul 18, 2023Updated 2 years ago
- Data-flow Analysis Visualizer☆10Dec 9, 2021Updated 4 years ago