Git module to prevent from committing sensitive information into the repository.
☆51Aug 22, 2017Updated 8 years ago
Alternatives and similar repositories for git-seekret
Users that are interested in git-seekret are comparing it to the libraries listed below
Sorting:
- Help recover passwords / etc. that were incorrectly entered with a typo☆13Jan 24, 2017Updated 9 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- Example code and files for the MyoWare™ Bionic 3D Printed Claws tutorial☆13May 26, 2015Updated 10 years ago
- All the excellent centers☆17Aug 4, 2025Updated 7 months ago
- Viewer for Observing Multiple Computers using VNC☆18Feb 13, 2010Updated 16 years ago
- Twitter Futures for Python☆58Jun 22, 2014Updated 11 years ago
- a tool that facilitates eavesdropping and man-in-the-middle attacks☆16Mar 20, 2013Updated 12 years ago
- Reassembles UDP/TCP packets into application layer messages.☆42Mar 28, 2018Updated 7 years ago
- Markov chain generator in Dart☆35Nov 20, 2018Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Aug 23, 2019Updated 6 years ago
- ☆14Nov 2, 2017Updated 8 years ago
- An organization chart for the government of the United States.☆38Jun 23, 2014Updated 11 years ago
- ZIP 💣 httpd. Just a gift for scanners and bots.☆21Jul 13, 2017Updated 8 years ago
- Crawl a site, run pa11y on every HTML page, and get the results☆18Sep 27, 2016Updated 9 years ago
- Easy-as RPC. Zero-server RPC for Python and Java.☆44Aug 23, 2016Updated 9 years ago
- A mirrored repository on sourcehut☆24Sep 14, 2025Updated 5 months ago
- ☆22Feb 18, 2026Updated 2 weeks ago
- A Bayesian Method for the Induction of Probalistic Networks from Data☆19Jul 6, 2017Updated 8 years ago
- A collection of scripts to aid in reverse engineering and exploit development.☆24Oct 3, 2021Updated 4 years ago
- ⚔️MITRE ATT&CK Machinations in R☆23Aug 11, 2020Updated 5 years ago
- Another™ MCP Server for Binary Ninja with superpower 🥵☆35May 13, 2025Updated 9 months ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- Executables that execute other stuff☆54Jul 6, 2018Updated 7 years ago
- 18F Brand☆29Feb 16, 2024Updated 2 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Oct 2, 2022Updated 3 years ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆36Aug 9, 2022Updated 3 years ago
- TAXII Documentation☆25May 10, 2019Updated 6 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- .Net assembly code depency inspector☆36Dec 10, 2018Updated 7 years ago
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- ☆40Aug 25, 2018Updated 7 years ago
- ☆11Jun 10, 2020Updated 5 years ago
- ripPE - section extractor and profiler for PE file analysis☆33Aug 8, 2014Updated 11 years ago
- The collection of Javascript / JScript / VBScript extensions, tools and more☆32Feb 29, 2024Updated 2 years ago
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆37Mar 27, 2022Updated 3 years ago
- Reconnaissance tool for Microsoft Office 365☆69Nov 21, 2018Updated 7 years ago
- A Reverse Engineering Assistant leveraging Retrieval-Augmented Generation (RAG) and the LLaMA-3.1-8B-Instant Large Language Model (LLM). …☆36Nov 26, 2025Updated 3 months ago
- Use the ESP32 as a software motion detector for whole house based on multipath interference in RSSI. Will detect human intruders when the…☆46Jul 24, 2025Updated 7 months ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 8 years ago