Simulation environment for attacks on computer networks
☆22Jun 1, 2022Updated 3 years ago
Alternatives and similar repositories for PurpleDome
Users that are interested in PurpleDome are comparing it to the libraries listed below
Sorting:
- LPARDesign Tool - Helps in configuring your CPC for PR/SM and HiperDispatch☆10Jun 17, 2024Updated last year
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 4 months ago
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆29Sep 23, 2025Updated 5 months ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated last year
- A CLI for the IBM Z HMC☆11Feb 26, 2026Updated last week
- Raspberry Pi powered Digital Clock for Amateur Radio using TM1637 4 digit displays☆11Mar 20, 2021Updated 4 years ago
- Docker + Consul + Vault☆40Aug 7, 2018Updated 7 years ago
- RNN-based IDS for SOME/IP Intrusion Detection☆10Jul 20, 2021Updated 4 years ago
- A Vanilla Web Component wrapper for hCaptcha. Allows for easy integration with hCaptcha in many modern web frameworks.☆18Feb 20, 2026Updated 2 weeks ago
- Repository where you can clone anything which has to do with Automation.☆10Nov 4, 2024Updated last year
- Tools to work with the pwnedkeys.com API☆10Dec 20, 2018Updated 7 years ago
- Framework for Rogue Wi-Fi Access Point Attack☆12Aug 31, 2015Updated 10 years ago
- ☆11Jul 25, 2023Updated 2 years ago
- Curated list of resources about writing prompts for AI: Stable Diffusion, ChatGPT, etc☆10Mar 20, 2023Updated 2 years ago
- 2nd Year University Group Project - Cyclist route-planning app to minimise air pollution exposure☆10May 22, 2023Updated 2 years ago
- Code download to vintage PDP-11's over serial console monitor.☆12Nov 13, 2023Updated 2 years ago
- DEC VT240 Emulator☆13Oct 5, 2025Updated 5 months ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- ☆39Sep 26, 2022Updated 3 years ago
- ☆11Jan 2, 2023Updated 3 years ago
- Running COBOL on the wild!? No OS required, works with multiboot☆11Jul 31, 2023Updated 2 years ago
- ☆13Nov 12, 2024Updated last year
- Tor control port command line tool☆13Apr 21, 2025Updated 10 months ago
- HWP Document Fuzzer (Simple OLE Structure Parsing)☆15Dec 30, 2014Updated 11 years ago
- urlscan.io API wrapper for Ruby☆13Oct 16, 2023Updated 2 years ago
- Reproducing feature engineering & oversampling experiments on TPEHG DB and assessing the real impact of over-sampling☆16Jan 19, 2020Updated 6 years ago
- Alpine-based Docker image to perform generic file checks on your source code in order to improve consistency within your repository (e.g.…☆13Mar 18, 2024Updated last year
- This project deals with vulnerability analysis and classification using machine learning techniques i.e. Natural Language Processing.☆10Feb 21, 2019Updated 7 years ago
- ☆11May 7, 2019Updated 6 years ago
- This is for management of IBM z/OS Management Facility (z/OSMF) One Stop Hub website and sample code.☆10Nov 5, 2025Updated 4 months ago
- Wrapper script for letsencrypt☆11May 27, 2020Updated 5 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- AutoIt Obfuscator (Python module) lets you protect AutoIt script source code against analysis, reverse engineering, and decompilation usi…☆12Nov 27, 2025Updated 3 months ago
- automatic classification of ETFs in Portfolio Performance using holding lists☆14Nov 22, 2020Updated 5 years ago
- The full schematic, flash dump, and gerbers for the Nintendo DS Action Replay by Datel☆11Nov 26, 2022Updated 3 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago