☆17Jul 22, 2016Updated 9 years ago
Alternatives and similar repositories for General-Resources-Box
Users that are interested in General-Resources-Box are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 10 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- syscall hijacking in 2019☆13Feb 25, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- ☆11May 19, 2017Updated 8 years ago
- Using OpenCV and MatLab for edge detection in the Lab colorspace☆12Feb 20, 2015Updated 11 years ago
- buddycloud static site generation and gh_pages☆18Sep 8, 2016Updated 9 years ago
- Hand-made Improved Nuclei Templates!🪴☆13Jun 12, 2023Updated 2 years ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 6 months ago
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated 2 months ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Cobalt Strike Aggressor Script Collection☆19Mar 30, 2018Updated 8 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆18Aug 21, 2017Updated 8 years ago
- Text file containing NSFW words aggregated from various sources.☆10Aug 23, 2020Updated 5 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Jun 14, 2014Updated 11 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- 🌵 Command and Action routine Server☆16Updated this week
- A very basic introduction to reverse engineering (in general and for Android) as well as some useful tools (apktool, dex2jar, jd-cmd) pac…☆12Jul 21, 2020Updated 5 years ago
- The ronin-rb.dev website☆24Jan 12, 2026Updated 2 months ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Exemple d'extension Burp permettant d'utiliser les fichiers de configuration de proxy PAC☆11Feb 28, 2016Updated 10 years ago
- WAF Testing Tool☆21May 16, 2014Updated 11 years ago
- A solver for GCHQ's christmas card puzzle☆12Dec 14, 2015Updated 10 years ago
- For the analysis of CVE-2013-2028☆30Jun 7, 2018Updated 7 years ago
- UNMAINTAINED - Vulnerability scanner and information gatherer for the Concrete5 CMS☆20Sep 17, 2020Updated 5 years ago
- A library that makes developing Swing applications on Jython much less painful☆16Jan 23, 2018Updated 8 years ago
- Go solutions for the cryptopals crypto challenges: http://cryptopals.com/☆12Feb 22, 2022Updated 4 years ago
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- Vulnerability Management tool using the CVE-Search database☆10Apr 22, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Utilities for working with Kony mobile applications.☆19Mar 29, 2026Updated last week
- Repository collecting and automagically processing public threat intelligence reports.☆19May 1, 2020Updated 5 years ago
- Resource mining and processing plugin for Kerbal Space Program.☆11Jul 6, 2022Updated 3 years ago
- Remote adb Executor Library☆15Apr 7, 2014Updated 12 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago