A script to automate Jenkins credential store decryption
☆17May 29, 2018Updated 7 years ago
Alternatives and similar repositories for junkins
Users that are interested in junkins are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of Slides From My Conference Talks☆20Nov 21, 2022Updated 3 years ago
- link a linux ELF .so library into memory with python and call functions in it, even if you're not on linux☆10Feb 5, 2020Updated 6 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆23Nov 19, 2018Updated 7 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆61May 8, 2017Updated 8 years ago
- Some Of Huawei Routers Exploits☆15Sep 1, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tools to work with the pwnedkeys.com API☆10Dec 20, 2018Updated 7 years ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Updated this week
- Publications of my PDF vulnerability research, including presentation materials (slides and whitepapers) and demonstration files (proof-o…☆11Jul 4, 2020Updated 5 years ago
- Integration for backscrub project into OBS Studio☆11Apr 28, 2023Updated 3 years ago
- ☆34Apr 18, 2020Updated 6 years ago
- A PoC to trigger CVE-2023-5217 from the Browser WebCodecs or MediaRecorder interface.☆17Oct 11, 2023Updated 2 years ago
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 9 years ago
- ☆13May 9, 2023Updated 2 years ago
- ☆44Oct 20, 2017Updated 8 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A CPU Backdoor. Phrack 72☆15Dec 4, 2025Updated 5 months ago
- gh cli extension to create submodules inside a repo☆17Sep 20, 2024Updated last year
- PowerShell scripts for Hard Drive forensics and parsing Windows Artifacts☆56Oct 15, 2020Updated 5 years ago
- Integrate SmartThings with Bryant Evolution / Carrier Infinity☆10Feb 27, 2018Updated 8 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Apr 25, 2013Updated 13 years ago
- File transfer via DNS☆76May 21, 2017Updated 8 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- Contextual Deserialization vulnerability that causes RCE - Remote Code Execution☆14Apr 28, 2024Updated 2 years ago
- A webscraper example in golang that scrapes list of projects from your Gitlab account.☆11Aug 22, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- CVE-2021-40444 Sample☆12Sep 10, 2021Updated 4 years ago
- Some scripts and exploits☆149Jul 9, 2018Updated 7 years ago
- read process memory with process_vm_readv☆16Feb 10, 2020Updated 6 years ago
- ZPU - the worlds smallest 32 bit CPU with GCC toolchain☆16Jul 17, 2014Updated 11 years ago
- Kubernetes cluster managed by Flux and using git as a "single source of truth."☆13Feb 7, 2026Updated 2 months ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆19Jun 6, 2024Updated last year
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Docker Automated Build for Security Testing Tools☆14Apr 8, 2022Updated 4 years ago
- 🦅 Falcon Malware Sandbox APIv2 Connector☆31Mar 22, 2023Updated 3 years ago
- Allocating physical memory in linux userspace☆10Jun 14, 2023Updated 2 years ago
- Packer stuff to build a Kali 1.0.9 vagrant box☆18Mar 11, 2015Updated 11 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Mar 19, 2018Updated 8 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆16May 1, 2022Updated 4 years ago
- A collection off SVG for Home Assistant☆13Apr 25, 2025Updated last year