chrissistrunk / SecurityAxiomsView external linksLinks
This is a list of Computer and Network Security Axioms
☆30May 1, 2020Updated 5 years ago
Alternatives and similar repositories for SecurityAxioms
Users that are interested in SecurityAxioms are comparing it to the libraries listed below
Sorting:
- random scripts for random things☆13Mar 11, 2025Updated 11 months ago
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago
- This repo contains workshop material delivered at #nullcon2020☆16Mar 6, 2020Updated 5 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- iWar - The intelligent war dialer.☆29Apr 1, 2020Updated 5 years ago
- A collection of offensive tools I've hacked together for CTFs and such☆20Aug 9, 2016Updated 9 years ago
- autossh-init - AutoSSH init script☆38Nov 9, 2013Updated 12 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- Material do Grupo de Estudos em Ciência de Dados☆13Jan 25, 2021Updated 5 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- ☆11Sep 23, 2025Updated 4 months ago
- Kill Chain Matrix -->>☆38Jun 17, 2019Updated 6 years ago
- Export Tweets from Twitter into JSON file then publish as a Graph objects in Neo4j DB☆10Dec 7, 2018Updated 7 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- A Python interface to the Earthworm Seismic Data System.☆13Oct 4, 2024Updated last year
- An implementation of crypto.Signer and crypto.Decrypter for private keys resident on a TPM 2.0 device☆11Aug 6, 2025Updated 6 months ago
- Reproducible Analytical Pipeline of the Hospital Standardised Mortality Ratio (HSMR) quarterly publication☆11Jun 21, 2024Updated last year
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- Admin Submission API allows submission of URLs, mail messages, file mail messages and files to Microsoft to re-scan and get newest verdic…☆10Aug 6, 2021Updated 4 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Mar 14, 2019Updated 6 years ago
- virt plugin for netdata to monitor libvirt-managed VMs☆11Mar 25, 2022Updated 3 years ago
- Board files and example code for the EL Sequencer☆15Jun 27, 2025Updated 7 months ago
- Public non-official repository of the famous ToneLoc wardialer☆50May 8, 2020Updated 5 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- Florida Man 2017☆10Aug 3, 2017Updated 8 years ago
- NVIDIA Compute Unified Device Architecture Toolkit☆15Feb 2, 2026Updated 2 weeks ago
- Convert text to speech using Google Translate API☆38Aug 1, 2017Updated 8 years ago
- ☆12Dec 2, 2022Updated 3 years ago
- Google Tink's critical Ed25519 bug related to Java "final" keyword☆11Apr 5, 2020Updated 5 years ago
- OWASP Zed Attack Proxy plugin for py.test☆13Sep 10, 2015Updated 10 years ago
- Python Library for Function Approximation in Machine Learning☆12Nov 5, 2019Updated 6 years ago
- Repositório da Disciplina de Geoprocessamento - UFRPE☆13Mar 2, 2020Updated 5 years ago
- DTMFDuino receives DTMF tones through a MT8870 integrated circuit who converts the analog audio of tones to a binary code understandable …☆17Jan 31, 2013Updated 13 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆10Aug 9, 2020Updated 5 years ago
- Ring with WS2812 intelligent RGB-LED☆13Mar 23, 2019Updated 6 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- Dashboard showcasing Conjoint Analysis for the Electric Vehicle Lease Market (as at January 2020) in San Francisco☆15Feb 19, 2020Updated 5 years ago