Automatically exported from code.google.com/p/mustache-security
☆23Mar 16, 2015Updated 10 years ago
Alternatives and similar repositories for mustache-security
Users that are interested in mustache-security are comparing it to the libraries listed below
Sorting:
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Mar 30, 2015Updated 10 years ago
- Curated list of public penetration testing reports released by several consulting firms☆48Mar 30, 2018Updated 7 years ago
- A customizable multi threaded monitor for Vinted.☆15Mar 6, 2022Updated 4 years ago
- The official Prewikka GitHub mirror of https://www.prelude-siem.org/projects/prewikka/repository☆10Sep 11, 2020Updated 5 years ago
- jPurify☆64Feb 16, 2017Updated 9 years ago
- 🎨 Locate your OSX wallpapers.☆11Oct 23, 2018Updated 7 years ago
- This repo would serve as an interface between the different clients and the platform. For API information please refer to the fabric8-ana…☆12Apr 13, 2023Updated 2 years ago
- iOS/Android-like fixied titles that scroll sorta☆33Apr 1, 2013Updated 12 years ago
- A clone of FD (File & Directory tool) by T.Shirai☆16Jan 29, 2014Updated 12 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- ☆11Jun 17, 2021Updated 4 years ago
- Pentester's toolbox☆12Jan 21, 2026Updated last month
- Certified Kubernetes Administrator (CKA) exercises☆12Jul 2, 2021Updated 4 years ago
- Minimalistic WebUI for passiveDNS tool☆18May 6, 2021Updated 4 years ago
- Create BIP39 mnemonic phrases with N number of dice sides☆12Apr 14, 2018Updated 7 years ago
- A dependency checker tool from The Linux Foundation☆14May 6, 2020Updated 5 years ago
- CLI for artistic image manipulation.☆15Feb 29, 2020Updated 6 years ago
- ☆11Jun 8, 2022Updated 3 years ago
- MDR Make Diffs Readable☆21Oct 31, 2014Updated 11 years ago
- A Vault client to manage secrets for Kubernetes pods.☆13Feb 10, 2019Updated 7 years ago
- Octant plugin for kind☆12Jan 19, 2023Updated 3 years ago
- This app leverages the Adaptive Response framework to perform API calls to Security Trails☆15Feb 14, 2019Updated 7 years ago
- Raspberry Pi Pico RP2040 powered Keyboard and Mouse converter, originally a project specifically for the IBM Model F PC/AT keyboard, it i…☆16Updated this week
- Corsaro is a software suite for performing large-scale analysis of trace data. It was specifically designed to be used with passive trace…☆12Jan 30, 2020Updated 6 years ago
- My technical memo☆16Jul 11, 2016Updated 9 years ago
- Client tool to Develop, Build, and Package Zimbra X compatible zimlets for development and production.☆14Updated this week
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- Welcome to my Cybersecurity Homelab, where I experiment with ethical hacking, penetration testing, network security, AI Agent automation …☆17Mar 11, 2025Updated 11 months ago
- Simple C++ class for quick & easy real-time plotting via a pipe to gnuplot☆11Oct 11, 2017Updated 8 years ago
- ☆10Jun 26, 2017Updated 8 years ago
- Kubexns is a container that enables the mapping of ConfigMaps or Secrets from different namespaces as volumes in Kubernetes Pods using a…☆14Updated this week
- patch to apply to a netbox installation to add beautiful topology view to sites☆13Mar 21, 2019Updated 6 years ago
- osquery Foundation Charter, Legal, and Process Documents☆13Jun 10, 2022Updated 3 years ago
- A library to interact with PHP memory limit☆13Jul 7, 2025Updated 7 months ago
- ☆11Mar 3, 2023Updated 3 years ago
- Lighter is a command-line tool for splitting large files into smaller ones.☆11Apr 30, 2023Updated 2 years ago
- Summary and archives of leaked Vietnam TLD DNS data☆46Sep 4, 2017Updated 8 years ago
- ☆10Mar 24, 2021Updated 4 years ago