☆27Feb 26, 2026Updated last week
Alternatives and similar repositories for daas
Users that are interested in daas are comparing it to the libraries listed below
Sorting:
- Python-based cloud node for local use☆11Mar 7, 2018Updated 7 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- ☆17Feb 29, 2020Updated 6 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Sep 24, 2014Updated 11 years ago
- Tool to test for existence of CVE-2020-8218☆22Sep 5, 2020Updated 5 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated 11 months ago
- An architecture plugin for binary ninja to disassemble raw python bytecode☆29Nov 12, 2017Updated 8 years ago
- Home to the ActorTrackr source code☆30Aug 31, 2017Updated 8 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- Vulners signature-base software version detection rules☆38Nov 9, 2021Updated 4 years ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- GIAnT, the Generic Implementation ANalysis Toolkit☆12Jul 4, 2018Updated 7 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- GPG key integration for Blockstack client applications☆10Aug 1, 2017Updated 8 years ago
- A free and open source command-line shell and scripting language designed especially for security testing☆128Oct 12, 2013Updated 12 years ago
- SAFE embeddings to match functions in yara☆100Feb 25, 2020Updated 6 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- linux lcx☆11Jul 18, 2016Updated 9 years ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- Look up an email domain (@example.com), using Python, across all known domains.☆48Sep 10, 2023Updated 2 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- Rust binding for fastpbkdf2☆15Jun 29, 2025Updated 8 months ago
- ☆21Dec 4, 2014Updated 11 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- Tools for 3CX Instances: Realtime Call Overview Panel for the Webclient, Phonebook sync with multiple numbers per contact, custom dial co…☆12Feb 24, 2023Updated 3 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Self sustainable DOM content fuzzy hashing☆11Oct 5, 2024Updated last year
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- USIM, EDITOR, IMSI, ICCID, MCC/MNC, SPN, GID1, GID2☆15Mar 8, 2020Updated 5 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Parse YARA rules and operate over them more easily.☆195Feb 6, 2025Updated last year