Python version of Praeda (Praeda-II) a MFP data harvesting tool
☆14Feb 2, 2026Updated last month
Alternatives and similar repositories for Praeda-II
Users that are interested in Praeda-II are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 6 months ago
- UART proxy tool for inter-chip analysis.☆23Mar 14, 2025Updated last year
- CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE☆19Apr 17, 2025Updated 11 months ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- This is a Yazi plugin that replaces the default file preview with extra information.☆21Feb 16, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- SNMP data gather scripts☆84Feb 12, 2024Updated 2 years ago
- Decrypts locally stored Pentaho Kettle (Spoon) Passwords☆16Jan 18, 2020Updated 6 years ago
- Undocumented Change Detector #supplychain #security☆18Mar 19, 2026Updated last week
- HELO: Test Big Ideas in Small Spaces.☆18Mar 11, 2026Updated 2 weeks ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- Bundle of security analysis scripts for keras tensorflow models☆16Apr 15, 2024Updated last year
- A custom script I created because I got tired of installing my tools manually!☆13Nov 19, 2024Updated last year
- An open-source and free favicon provider.☆17May 30, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 4 months ago
- Docker image for credhub (include a docker-compose file to run with uaa)☆11May 6, 2018Updated 7 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- personal NixOS config☆15Mar 17, 2026Updated last week
- ☆11Oct 29, 2024Updated last year
- Python passive host discovery script☆12Mar 30, 2025Updated 11 months ago
- ☆14Jun 4, 2025Updated 9 months ago
- (WIP) CIS Microsoft Azure Foundations Benchmark☆17Dec 14, 2025Updated 3 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆12Mar 25, 2024Updated 2 years ago
- Example implementation of DNSAdmin DLL PrivEsc attack☆28Dec 11, 2019Updated 6 years ago
- Compile SharpHound and others on Linux☆24Aug 16, 2024Updated last year
- A place where I put all the crazy random hacks I make☆21Apr 24, 2022Updated 3 years ago
- ☆31Dec 5, 2024Updated last year
- A macOS Wi-Fi security testing tool for analyzing WPA/WPA2 network security.☆36Dec 16, 2025Updated 3 months ago
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆20Apr 4, 2023Updated 2 years ago
- Axonius API Library for Python☆22Jan 8, 2026Updated 2 months ago
- Simple root privilege escalation detection using eBPF 🐝☆35Feb 10, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Various scripts I've built for CTFs, hacking challenges, and for learning how various existing tools work☆17Mar 21, 2023Updated 3 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Sample apps demonstrating how to use sidecar processes in Cloud Foundry☆15Apr 9, 2024Updated last year
- Provides tasks to take a Windows ISO and transform to a Windows stemcell for Cloud Foundry, in VSphere.☆13Aug 8, 2024Updated last year
- Red Team Tool Kit☆16Mar 10, 2019Updated 7 years ago
- ☆189Aug 3, 2024Updated last year
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Mar 8, 2018Updated 8 years ago