"its like OAB in python because snake"
☆17Feb 5, 2018Updated 8 years ago
Alternatives and similar repositories for boa
Users that are interested in boa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- Collection of Jupyter notebooks☆13Mar 11, 2021Updated 5 years ago
- Copy-on-write fork()-like memory dump using Process Snapshotting APIs☆13Jul 23, 2017Updated 8 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tools for macOS Forensic Bootable media☆16May 20, 2020Updated 5 years ago
- ☆11Aug 3, 2018Updated 7 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated 10 months ago
- IBM System i (formerly AS400, iSeries, i5, etc.)☆12Feb 10, 2013Updated 13 years ago
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 3 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- Aegis Implicit Mail☆15Jan 27, 2023Updated 3 years ago
- Registry Miner☆14Apr 10, 2018Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Spring Boot with FreeMarker - Server Side Template Injection example☆17Jan 28, 2019Updated 7 years ago
- QJSEngine bindings for the Qt 6 API☆11Feb 4, 2026Updated 2 months ago
- Websocket communications with Push and Poll messages☆20Oct 26, 2025Updated 5 months ago
- Oh My Zsh Theme line.zsh-theme☆14Apr 7, 2020Updated 6 years ago
- Parser for Windows PowerShell script block logs☆100Aug 4, 2024Updated last year
- This is a python version of samesame repo to generate homograph strings☆24Aug 22, 2018Updated 7 years ago
- ☆92Oct 28, 2016Updated 9 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- WSDL Parser extension for Burp☆20Feb 13, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Issue with NSCollectionView's default drag and drop implementation☆12May 3, 2018Updated 7 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- A Red Team tool for remotely manipulating Group Policy Object(GPO), Organizational Unit(OU), GPLink and Security Filtering☆121Sep 28, 2021Updated 4 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆27Jan 2, 2023Updated 3 years ago
- iOS Backup Examiner - A forensics tool for parsing an iOS backup's Info.plist file☆23Dec 5, 2016Updated 9 years ago
- ☆24Nov 19, 2024Updated last year
- Windows Process Lockdown Tool using Job Objects☆70Nov 10, 2013Updated 12 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Modified dropbear server which acts as a client and allows authless login☆126Aug 27, 2018Updated 7 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆20Jun 13, 2019Updated 6 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Aug 12, 2015Updated 10 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- ☆11May 19, 2017Updated 8 years ago
- Runs PowerShell commands as elevated over Windows Remote Management (WinRM) via a scheduled task☆31Apr 11, 2022Updated 4 years ago
- PoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.☆30Aug 31, 2019Updated 6 years ago