basedbytes / spoofyView external linksLinks
Cross-platform MAC and DUID spoofing for modern environments. Full macOS support, with Linux and Windows MAC spoofing coming soon.
☆27Dec 31, 2025Updated last month
Alternatives and similar repositories for spoofy
Users that are interested in spoofy are comparing it to the libraries listed below
Sorting:
- Workshop - Windows Container☆11Dec 20, 2017Updated 8 years ago
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 3 years ago
- 👔 Yet Another Lightweight Emacs Configuration, Using KISS philosophy.☆10Nov 1, 2023Updated 2 years ago
- K8 Deep dive - Core Concepts, CRDs, Operators, Controllers, Openshift, kubebuilder, Coreos operator framework☆10May 1, 2023Updated 2 years ago
- Valley of Concordia video game, based upon the Flare Engine☆15Dec 2, 2014Updated 11 years ago
- Gradle plugin for integrating with HCL AppScan Source☆13Jan 29, 2026Updated 2 weeks ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- ☆14Mar 8, 2021Updated 4 years ago
- A web app for your finances☆12May 24, 2020Updated 5 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Feb 4, 2026Updated last week
- Deprecated; please use https://github.com/marketplace/actions/fortify-ast-scan instead☆13Nov 1, 2023Updated 2 years ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- Physical disk use retrieval☆11Mar 19, 2020Updated 5 years ago
- [DEPRECATED] Ocean Operator for Kubernetes.☆11May 4, 2022Updated 3 years ago
- Provide some tips to handle Injection into application code (OWASP TOP 10 - A1).☆10Nov 11, 2020Updated 5 years ago
- Jupyter client☆15Jul 12, 2025Updated 7 months ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 8 months ago
- a deadly simple repl for cpp with ghci style commands☆14Jan 7, 2023Updated 3 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- List your tfsec issues in the QuickFix window with this plugin.☆12May 16, 2022Updated 3 years ago
- OSINT license plate data by scraping lookup site(s)☆13Apr 2, 2023Updated 2 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- A Dependently Typed Esolang☆10Aug 4, 2017Updated 8 years ago
- ☆12Dec 21, 2021Updated 4 years ago
- CSV exports of cryptocurrency exchange data using APIs for accuracy and convenience☆11May 16, 2021Updated 4 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Jun 30, 2025Updated 7 months ago
- Elixir client for GraphQL☆10Jun 12, 2019Updated 6 years ago
- OWASP Foundation Web Respository☆12Dec 21, 2022Updated 3 years ago
- This web based application enables developers to quickly unit test individual API calls for both Incapsula and SecureSphere, as well as p…☆19Sep 12, 2023Updated 2 years ago
- Projeto voltado ao desenvolvimento de uma aplicação web intencionalmente vulnerável.☆11Feb 25, 2023Updated 2 years ago
- Forge TCP or UDP packets with scapy☆13Sep 7, 2012Updated 13 years ago
- ☆12Mar 18, 2022Updated 3 years ago
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- ☆12Jan 9, 2023Updated 3 years ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated last month