A Coarse-grained Dynamic Analysis Framework
☆23Jan 24, 2026Updated last month
Alternatives and similar repositories for lya
Users that are interested in lya are comparing it to the libraries listed below
Sorting:
- This repository contains code example in how to write search queries with OpenSearch Python client☆10Sep 20, 2023Updated 2 years ago
- Autonomous AI-powered security scanner — multi-agent vulnerability detection, exploitation, and validation engine☆35Updated this week
- MacOS Swift Menubar for managing launching/stop/restart for Clawdbot☆24Jan 10, 2026Updated last month
- Python-based cloud node for local use☆11Mar 7, 2018Updated 7 years ago
- An example app used to showcase Anvil Etch E-Signature API using the node-anvil client.☆13Feb 12, 2026Updated 2 weeks ago
- Base class for Jupyter Data Integrations☆11Feb 11, 2026Updated 2 weeks ago
- ☆14Sep 22, 2023Updated 2 years ago
- LAMP with CentOS☆32Sep 12, 2014Updated 11 years ago
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- ☆14Jan 8, 2026Updated last month
- Virus Total Lookup Script☆14Aug 18, 2015Updated 10 years ago
- DNS delegation path traceroute☆12May 17, 2016Updated 9 years ago
- Clawd node in go☆39Jan 5, 2026Updated last month
- irCRpull is a PowerShell script utilized to pull several system artifacts, utilizing the free tool CrowdResponse, from a live Win7+ syste…☆14Mar 25, 2015Updated 10 years ago
- Workflow Engine for Python☆11Oct 10, 2022Updated 3 years ago
- Transfer Kippo data to ElasticSearch☆18Dec 14, 2015Updated 10 years ago
- ☆12Feb 21, 2022Updated 4 years ago
- Manage Splunk Agents and Servers☆16Jul 16, 2025Updated 7 months ago
- Example of event-driven architecture with FastAPI Gateway, Kafka, Redis pub/sub and Faust-streaming☆16Jan 12, 2022Updated 4 years ago
- ☆12Jun 28, 2017Updated 8 years ago
- ☆14Mar 6, 2023Updated 2 years ago
- ☆15May 26, 2021Updated 4 years ago
- ☆13Feb 10, 2022Updated 4 years ago
- Examples and exercises for Azure Security from Manning Books☆20May 29, 2023Updated 2 years ago
- Get notified on the addition or removal of roles and permissions in Microsoft Entra ID and Azure☆16Updated this week
- Exfiltrate data from a compromised target using covert channels☆17Mar 20, 2021Updated 4 years ago
- Decrypt cookie values in Chrome Sqlite DB on Mac OX S, use Openssl☆18Jun 2, 2015Updated 10 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- Let's Chat repo for the Road to Modern Ops curriculum☆17Jul 15, 2020Updated 5 years ago
- ☆20Feb 9, 2024Updated 2 years ago
- A high-throughput, structured streaming framework built atop Redis Streams. C++, Python, and MATLAB support.☆16Dec 20, 2023Updated 2 years ago
- ☆14Feb 8, 2019Updated 7 years ago
- Linksys Smart Wi-fi X-JNAP-Action Sensitive Information Disclosure for EA8500 router and potentially others☆21Jun 14, 2021Updated 4 years ago
- Multithreading search through Bitbucket git repositories for sensitive data (see TruffleHog/regexChecks.py), digging deep into commit his…☆17Mar 21, 2018Updated 7 years ago
- A Python API client for interacting with the Gumroad API☆18Oct 1, 2025Updated 5 months ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- A place to put random stuff☆17May 12, 2024Updated last year
- Collecting public SSH keys using GitHub APIs☆18Mar 23, 2025Updated 11 months ago
- MS Entra ID Protection Guidance☆22Apr 2, 2024Updated last year