carlospolop / github_archive_scraperLinks
☆17Updated 2 years ago
Alternatives and similar repositories for github_archive_scraper
Users that are interested in github_archive_scraper are comparing it to the libraries listed below
Sorting:
- Network Traffic Fuzzer☆18Updated 8 months ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- A fast GitHub stargazers information gathering tool☆74Updated 3 years ago
- Cross platform system wide proxy server & TLS Interception library for Python☆22Updated 2 years ago
- Open YARA scan- and search engine☆24Updated 6 months ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Automated privilege escalation of the world's most popular Docker images.☆69Updated last year
- A port scanner written in PowerShell☆13Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Updated 2 years ago
- A collection of personal ZAP scripts☆14Updated 2 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13Updated 8 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 9 months ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- A command-line application to generate random user agent strings.☆17Updated 5 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- A command based package for simple display of statistics☆25Updated 9 months ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆30Updated 6 years ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆15Updated last year
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Custom Binary Ninja Themes☆12Updated last year