☆24May 22, 2024Updated last year
Alternatives and similar repositories for Project-Obsidian-DC31
Users that are interested in Project-Obsidian-DC31 are comparing it to the libraries listed below
Sorting:
- https://academy.tcm-sec.com/☆14Aug 19, 2025Updated 6 months ago
- ☆12Feb 27, 2026Updated last week
- ReWrite of AChoir in Go for Cross Platform forensic artifact collection and processing☆41Feb 28, 2026Updated last week
- HITCON 2021 x DEVCORE Wargame☆41Jan 6, 2022Updated 4 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- 直接在桌面顯示彈幕 Display bullet screen directly on the desktop☆10Mar 2, 2026Updated last week
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- 存放投稿里的一些文件☆11Oct 31, 2020Updated 5 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Modular framework for automating triaging, malware analysis, and analyst workflows☆45May 2, 2025Updated 10 months ago
- Exploring hands-on Cybersecurity techniques with a comprehensive repository covering offensive and defensive tools for home-lab environme…☆20Mar 27, 2024Updated last year
- Intel® Generic Implementation of LAGraph* for Go*☆10Feb 23, 2026Updated 2 weeks ago
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- ☆13Dec 28, 2019Updated 6 years ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 9 months ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Made VRChat Avatar creation and testing easier☆10Dec 28, 2022Updated 3 years ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 3 years ago
- ☆15Apr 10, 2025Updated 11 months ago
- 艦隊可以蒐藏/ASCII Art 也可以☆11Nov 24, 2016Updated 9 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 9 months ago
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- A portable Go module for iSCSI operations.☆11Feb 23, 2026Updated 2 weeks ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- A toolkit for CTF challenges☆10Jan 18, 2017Updated 9 years ago
- Pop Os dotfiles☆10Mar 18, 2023Updated 2 years ago
- An easy way to generate eBooks from multiple markdown files using Pandoc.☆10Oct 22, 2018Updated 7 years ago
- A PHP library for converting between different types of durations.☆11Mar 19, 2019Updated 6 years ago
- 使用 rwkv 架構的大型語言模型運作的 Discord 聊天機器人,擁有辨識維基百科條目名並將其當作關鍵字抽取出的能力,並且還會將此關鍵字用於爬取維基百科,並將條目內容回傳給自身參考。近期更新串接API版本。☆12Aug 27, 2024Updated last year
- ☆13Aug 1, 2023Updated 2 years ago
- API Penetration Testing Notes☆16Sep 25, 2025Updated 5 months ago
- Telegram hacking tool☆13Jul 14, 2021Updated 4 years ago
- Analyze, tweak and extract morse code from audio files.☆12Aug 25, 2022Updated 3 years ago
- Login and Signup form using PHP & MySQL. The code doesn't contain the elements to encrypt the password. You can enable it by using php bu…☆10Jan 27, 2019Updated 7 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago