Open Methodology for Security Tool Developers
☆25Feb 23, 2016Updated 10 years ago
Alternatives and similar repositories for OMSTD
Users that are interested in OMSTD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Django based web page to test your security tools☆10May 8, 2013Updated 13 years ago
- SSH brute forcer tool and library, using AsyncIO of Python 3.4☆36May 27, 2020Updated 5 years ago
- PyDiscover: Simple Secure and Lightweight Python Service Discovery☆41May 27, 2020Updated 5 years ago
- A cache system for aiohttp server☆44Apr 12, 2024Updated 2 years ago
- OpenVAS2Report: A set of tools to manager OpenVAS XML report files.☆41May 27, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Message Queue & Broker Injection tool☆149May 8, 2023Updated 3 years ago
- Off-heap large object storage☆367Aug 27, 2020Updated 5 years ago
- Swagger API Documentation builder for aiohttp server☆188Apr 13, 2026Updated 3 weeks ago
- REST API client to consume w3af☆17May 22, 2023Updated 2 years ago
- My repositories for Icestudio.☆13Jul 14, 2025Updated 9 months ago
- KafkaT-ool☆502Jun 1, 2019Updated 6 years ago
- A blinky project for the ULX3S v3.0.3 FPGA board☆17Jan 16, 2026Updated 3 months ago
- ☆11Sep 6, 2020Updated 5 years ago
- ☆15Dec 3, 2025Updated 5 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆17May 4, 2020Updated 6 years ago
- ☆15Apr 13, 2026Updated 3 weeks ago
- Threat models, verification standards, and security controls for AI agent architectures. Built on OWASP AISVS and NIST AI RMF.☆21Feb 17, 2026Updated 2 months ago
- Simple 6502 system on a ULX3S FPGA board☆18Feb 26, 2020Updated 6 years ago
- ☆35Apr 22, 2026Updated 2 weeks ago
- ☆13Aug 29, 2024Updated last year
- Hugo theme that powers awsomsauce!☆10Dec 6, 2022Updated 3 years ago
- Linking Of Virtual Electronics to FPGAs 🙂. Use virtual components with real hardware for debugging without simulation☆14Apr 24, 2024Updated 2 years ago
- sources for a free graphics textbook hosted at https://math.hws.edu/graphicsbook☆22Jul 9, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.☆1,449Dec 12, 2023Updated 2 years ago
- ☆14Jun 21, 2015Updated 10 years ago
- AI-powered threat modeling that turns architecture diagrams and business context into actionable threats☆29Apr 30, 2026Updated last week
- Puppet module for OpenSCAP☆14Mar 21, 2025Updated last year
- Space Invaders in Verilog for the iCE40 H1K☆17Feb 15, 2024Updated 2 years ago
- Security Tool Builder: project to automate the building of hacking tools☆21Mar 7, 2022Updated 4 years ago
- The Most Comprehensive Docker Security Scanner☆1,540Updated this week
- Lab and supplemental content for AWS re:Inforce 2019 session SEP315☆13Feb 28, 2022Updated 4 years ago
- Test of ICEstick PLL usage with Yosys/Arachne-PNR/Icetools☆21Oct 8, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Materials related to the extensive video tutorial "mastering libcurl"☆19Nov 20, 2023Updated 2 years ago
- Curso de 35h sobre el diseño de sistemas digitales usando FPGAs libres, orientado para makers☆19Jul 4, 2017Updated 8 years ago
- A FREE comprehensive step-by-step embedded RISC-V hacking tutorial covering RISC-V Embedded Software Development to Reverse Engineering.☆26Nov 26, 2025Updated 5 months ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- Manage the metasploit framework database☆16Nov 8, 2020Updated 5 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago