Scapy Presentation and Code
☆28Oct 19, 2015Updated 10 years ago
Alternatives and similar repositories for scapy
Users that are interested in scapy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- This repository contains free Hybrid Analysis contributions to the IT-Security community☆27May 6, 2021Updated 5 years ago
- Scapy tools and scripts☆20Jun 19, 2020Updated 5 years ago
- Scapy docs, examples, scripts and other stuff☆40Mar 4, 2015Updated 11 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆17Dec 20, 2018Updated 7 years ago
- ☆13Nov 8, 2017Updated 8 years ago
- A lightweight PDF library optimized for metadata extraction and insertion☆14Jun 2, 2017Updated 8 years ago
- ☆12Aug 29, 2025Updated 8 months ago
- YARA package for Sublime Text☆19Nov 30, 2025Updated 5 months ago
- Meeting notes☆14Apr 5, 2016Updated 10 years ago
- Arya is a simple obfuscator for .NET binaries.☆37Dec 11, 2017Updated 8 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 9 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- [INACTIVE] Watch repositories star counts☆12Oct 17, 2016Updated 9 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- Deploy nocode via Serverless Framework☆11Feb 7, 2018Updated 8 years ago
- Various public documents, whitepapers and articles about APT campaigns☆55Apr 1, 2016Updated 10 years ago
- ☆10Jul 3, 2021Updated 4 years ago
- This is a web site scraper. Collects all urls from any site.☆16Apr 28, 2015Updated 11 years ago
- pivottablejs for air-gapped systems☆13Aug 14, 2024Updated last year
- 👓 monitoring, alerting and threat analysis for ELK stack☆11Mar 27, 2017Updated 9 years ago
- retrive metadata endpoint data with these one liners.☆41Aug 11, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 12 years ago
- Bash script to create an ebook from a list of web articles. Inspired by the now-defunct Readlists.org by Readability☆18Oct 13, 2019Updated 6 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- Execute shellcode and evade AV detection with python.☆15Oct 8, 2015Updated 10 years ago
- Automatic lustre striping during file creation when using bzip2, gzip, rsync, and tar☆12Mar 14, 2024Updated 2 years ago
- Sample code for Python networking and threading☆11Oct 27, 2014Updated 11 years ago
- A pure Ruby library for parsing the XML out of an AndroidManifest.xml stored in an APK package☆16Aug 5, 2016Updated 9 years ago
- This is a list of companies that endorse Cal Newport's Deep Work approach.☆12Mar 13, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- iPython notebooks presented in rogue.ly/spy☆23Jul 26, 2014Updated 11 years ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 5 years ago
- CERT NZ documentation for hardening SSH server and client configuration, and using hardware tokens to protect private keys☆21Apr 13, 2018Updated 8 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Dec 31, 2018Updated 7 years ago
- Burp extension that add a tab to edit Office Open XML document (xlsx,docx,pptx)☆13Nov 26, 2017Updated 8 years ago
- Kemono creators API since actual site doesn't provide creators search.☆19Jan 16, 2026Updated 4 months ago
- Post-quantum Wireguard (Theory)☆13Sep 9, 2020Updated 5 years ago