Python static blog generator
☆42Nov 1, 2016Updated 9 years ago
Alternatives and similar repositories for habu
Users that are interested in habu are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple script for PGP encrypted newsletter☆26Feb 13, 2016Updated 10 years ago
- Honeypot repo☆48Aug 10, 2015Updated 10 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- openvpn server configs☆15May 12, 2016Updated 9 years ago
- Network Scout (NS) is an extension to Artillery. NS allows you to access log files from multiple clients.☆21May 2, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Transparent network tap☆123Oct 7, 2015Updated 10 years ago
- Bridge the terminal and browser☆18Jul 28, 2023Updated 2 years ago
- OpenELEC-AntiPrism - The living room secure PC for everyone☆14Jan 28, 2017Updated 9 years ago
- kdf password strengthener☆10Dec 26, 2019Updated 6 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Because "I just blogged about it" is too difficult to say.☆157Jul 20, 2015Updated 10 years ago
- Leave no chance to Surveillance Capitalism and let this extension make decisions for you☆29Dec 11, 2018Updated 7 years ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- Checklists☆16Sep 22, 2016Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- DEPRECATED - replaced with "monitor"☆123Dec 14, 2015Updated 10 years ago
- Virus Total Lookup Script☆14Aug 18, 2015Updated 10 years ago
- i2p c++ implementation☆19Feb 21, 2015Updated 11 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- This proxy signs requests with AWS IAM credentials.☆13Jul 11, 2023Updated 2 years ago
- Shell script to create an onion-router for your Raspberry Pi from a stock Moebius image☆28Jul 10, 2014Updated 11 years ago
- WebApp Honeypot for detecting Shell Shock exploit attempts☆55Jun 3, 2022Updated 3 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Install Phabricator on Ubuntu 16.04 Xenial with Ansible☆11Oct 18, 2017Updated 8 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Experimental multiprocess Ricochet client in Go☆47Oct 15, 2017Updated 8 years ago
- High Assurance Cryptographic Software☆10Dec 23, 2025Updated 3 months ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 5 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- backs up everything github knows about a repository, to the repository☆12Feb 15, 2012Updated 14 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Improved fork of JSON-XS☆42Feb 17, 2026Updated 2 months ago
- Off-The-Record Messaging protocol implementation for Python☆14Mar 19, 2025Updated last year
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- Honeypot Intelligence with Splunk☆255Oct 18, 2018Updated 7 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago