david-strejc / laskobotView external linksLinks
Enhanced MCP server for browser automation with improved element selection, tab management, and token optimization
☆39Oct 24, 2025Updated 3 months ago
Alternatives and similar repositories for laskobot
Users that are interested in laskobot are comparing it to the libraries listed below
Sorting:
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 9 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆41Feb 8, 2026Updated last week
- This repo hosts an MCP server for volatility3.x☆38Jul 9, 2025Updated 7 months ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆36Sep 4, 2022Updated 3 years ago
- ☆34May 30, 2023Updated 2 years ago
- Corelight@Home script☆45Oct 5, 2023Updated 2 years ago
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year
- Velociraptor Server hosted in Azure App Service☆59Jun 4, 2025Updated 8 months ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆66Mar 17, 2025Updated 10 months ago
- A more reliable way of resolving syscall numbers in Windows☆54Feb 12, 2024Updated 2 years ago
- using graph proxy to monitor teams user presence☆55Jun 27, 2024Updated last year
- A seamless matchmaking application that is programmed with Cohere Command R+, Stanford NLP DSPy framework, Weaviate Vector store and Crew…☆59Apr 20, 2024Updated last year
- ☆58Mar 4, 2022Updated 3 years ago
- This tool is designed to assist you in analyzing issues related to Defender for Endpoint on your local endpoint. It offers a centralized …☆74Nov 17, 2025Updated 2 months ago
- Packet captures of malicious traffic for analysis using Wireshark☆64Jul 10, 2023Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Feb 8, 2022Updated 4 years ago
- Runtime Security Solution for your CI/CD Pipeline☆113Jan 30, 2026Updated 2 weeks ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆89Dec 2, 2025Updated 2 months ago
- csv2ir is a script to convert ir .csv files to .ir files for the flipper.☆72May 26, 2022Updated 3 years ago
- An open-source collection of API key rotation tutorials.☆76Sep 5, 2025Updated 5 months ago
- ☆99Dec 11, 2025Updated 2 months ago
- ☆86Nov 18, 2022Updated 3 years ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆122Jul 19, 2025Updated 6 months ago
- macOS persistence mechanism scanner with code signature verification and timeline tracking.☆200Dec 20, 2025Updated last month
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆226Dec 18, 2025Updated last month
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆103Apr 23, 2024Updated last year
- ☆105Jul 5, 2025Updated 7 months ago
- YARA rule analyzer to improve rule quality and performance☆111Jan 18, 2026Updated 3 weeks ago
- This lightweight C# demo application showcases interactive remote shell access via named pipes and the SMB protocol.☆122Feb 21, 2025Updated 11 months ago
- Retrieve inner payloads from Donut samples☆117Dec 1, 2025Updated 2 months ago
- Intelligence tramite - Immagini - Video - Strumenti - Mappe☆132Aug 8, 2025Updated 6 months ago
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆124Dec 6, 2024Updated last year
- Convenience tool for hashcat☆120Aug 26, 2025Updated 5 months ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆137Jan 16, 2026Updated 3 weeks ago
- ☆124May 12, 2021Updated 4 years ago
- Putting a leash on naughty AWS permissions☆134Sep 5, 2025Updated 5 months ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆137Jul 17, 2024Updated last year
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆171Jan 9, 2026Updated last month