"its like OAB in python because snake"
☆17Feb 5, 2018Updated 8 years ago
Alternatives and similar repositories for boa
Users that are interested in boa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of Jupyter notebooks☆14Mar 11, 2021Updated 5 years ago
- Copy-on-write fork()-like memory dump using Process Snapshotting APIs☆13Jul 23, 2017Updated 8 years ago
- .Net 反序列化漏洞学习☆15Aug 29, 2020Updated 5 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated 10 months ago
- IBM System i (formerly AS400, iSeries, i5, etc.)☆12Feb 10, 2013Updated 13 years ago
- ☆37Dec 10, 2017Updated 8 years ago
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Registry Miner☆14Apr 10, 2018Updated 7 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Spring Boot with FreeMarker - Server Side Template Injection example☆17Jan 28, 2019Updated 7 years ago
- QJSEngine bindings for the Qt 6 API☆10Feb 4, 2026Updated last month
- CVE-2020-4464 / CVE-2020-4450☆36Aug 24, 2021Updated 4 years ago
- Parser for Windows PowerShell script block logs☆100Aug 4, 2024Updated last year
- This is a python version of samesame repo to generate homograph strings☆24Aug 22, 2018Updated 7 years ago
- ☆91Oct 28, 2016Updated 9 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- Issue with NSCollectionView's default drag and drop implementation☆12May 3, 2018Updated 7 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆27Jan 2, 2023Updated 3 years ago
- Fuzzy Categorical Distances☆14Mar 31, 2020Updated 5 years ago
- adding a backdooruser using win32api☆80Sep 3, 2020Updated 5 years ago
- Windows Process Lockdown Tool using Job Objects☆70Nov 10, 2013Updated 12 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆20Jun 13, 2019Updated 6 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Aug 12, 2015Updated 10 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- ☆34Aug 7, 2023Updated 2 years ago
- PoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.☆30Aug 31, 2019Updated 6 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- A 'Universal WHOIS' proxy server - you query it, it gives back the correct details☆42Nov 29, 2025Updated 3 months ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- ☆100Sep 15, 2025Updated 6 months ago
- BlackHat scrapy for download all the pdf file☆30Jun 7, 2024Updated last year
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- GNU Radio FM Receiver App for Android☆11Apr 22, 2016Updated 9 years ago