AI Powered Sensitive Information Detection
☆20Mar 13, 2024Updated last year
Alternatives and similar repositories for eclipse
Users that are interested in eclipse are comparing it to the libraries listed below
Sorting:
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated last month
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- Windows 权限提升 BadPotato☆14Jun 12, 2021Updated 4 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 2 months ago
- Python scripts for doing Android or IOS mobile forensics☆25Sep 28, 2016Updated 9 years ago
- Microsoft Developer Blogs Search Tool☆25Apr 24, 2025Updated 10 months ago
- ☆27Nov 7, 2023Updated 2 years ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆28Apr 30, 2025Updated 10 months ago
- 30 Days of Code HackerRank☆13Jun 21, 2024Updated last year
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Open Use of Data Agreement - Removing Barriers to Data Innovation☆18Aug 11, 2021Updated 4 years ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- ☆44Jul 21, 2025Updated 7 months ago
- Python package for handling CI and other integrations☆10Updated this week
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 5 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Explains the conclusions of a logic program.☆10May 25, 2023Updated 2 years ago
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆16Sep 16, 2025Updated 5 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆12Feb 19, 2021Updated 5 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆50Feb 22, 2024Updated 2 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- Extracting strings from binary data☆12Sep 30, 2024Updated last year
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- 一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972/31656以及log4j,提供一键上传webs…☆12Dec 18, 2023Updated 2 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Multi-threading Leaks/Intelligence file parser☆15Feb 16, 2026Updated last week
- ☆14Nov 12, 2021Updated 4 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- ☆10Sep 20, 2020Updated 5 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 3 years ago