Automatically exported from code.google.com/p/mustache-security
☆23Mar 16, 2015Updated 11 years ago
Alternatives and similar repositories for mustache-security
Users that are interested in mustache-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Curated list of public penetration testing reports released by several consulting firms☆48Mar 30, 2018Updated 7 years ago
- Advanced virtual host bruteforcer☆31Nov 23, 2015Updated 10 years ago
- Tool to scrape LinkedIn☆10Mar 16, 2017Updated 9 years ago
- ios source grepper☆42May 4, 2017Updated 8 years ago
- ☆13Jul 19, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- a .js scanner, built in php. designed to scrape urls and other info☆13Jul 20, 2017Updated 8 years ago
- ☆86Jul 27, 2022Updated 3 years ago
- Create BIP39 mnemonic phrases with N number of dice sides☆12Apr 14, 2018Updated 7 years ago
- ☆34Aug 5, 2015Updated 10 years ago
- See the history of a file from above☆17Aug 1, 2017Updated 8 years ago
- jPurify☆64Feb 16, 2017Updated 9 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- Chrome Extension for XSS Hunter Payloads☆14Sep 7, 2016Updated 9 years ago
- Another plugin for CRLF vulnerability detection☆25Jan 25, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- short, precise and uncommented solutions to keygenme or crackme challenges. INFO: Sadly crackmes.de got shut down. I do not have another …☆14Sep 14, 2016Updated 9 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Oct 19, 2021Updated 4 years ago
- A dashboard for interesting DOM tricks/techniques.☆35Dec 9, 2020Updated 5 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Combines the speed of masscan with the reliability and detailed enumeration of nmap☆17Aug 16, 2017Updated 8 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Mar 19, 2015Updated 11 years ago
- Cure53 Browser Security White Paper☆299Nov 29, 2017Updated 8 years ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- Official CTF for 44CON 2019☆17Jul 22, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Haxe→C++/Neko OpenSSL bindings☆30Jun 20, 2016Updated 9 years ago
- A static website template for security pages.☆19Jun 29, 2018Updated 7 years ago
- Ansible playbook for Kali☆31Aug 11, 2024Updated last year
- Web&Browser Security☆43Sep 27, 2022Updated 3 years ago
- Materials for OWASP presentation on malicious JavaScript☆16Aug 30, 2010Updated 15 years ago
- Ease-of-use extension for Web Application penetration testing☆23Jun 20, 2017Updated 8 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bucrowd LevelUp 2017 virtua…☆25Jul 15, 2017Updated 8 years ago
- Summary and archives of leaked Vietnam TLD DNS data☆46Sep 4, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- X-CTF 2016 Qualifiers Challenges Source☆12May 24, 2016Updated 9 years ago
- DC25 Party Badge☆11Aug 7, 2017Updated 8 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- Creating a vulnerable environment and the PoC☆15Nov 25, 2019Updated 6 years ago
- Forensic Dropbox☆22Jul 2, 2012Updated 13 years ago
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago