dmarcelinobr / DatasetsLinks
A collection of datasets
☆40Updated 3 years ago
Alternatives and similar repositories for Datasets
Users that are interested in Datasets are comparing it to the libraries listed below
Sorting:
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆70Updated 2 years ago
- Automate "airgapped" server proxy with ssh socks proxy☆101Updated 3 years ago
- Postman collection for United's internal in-flight wifi api☆44Updated 5 years ago
- edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of …☆51Updated 5 months ago
- A tool to extract useful data from documents☆157Updated 5 months ago
- CURRYFINGER - SNI & Host header spoofing utility.☆109Updated 5 years ago
- Source to www.draw.io☆99Updated 6 years ago
- Harden your Chrome browser via enterprise policy.☆287Updated 2 years ago
- ☆39Updated 9 months ago
- Russian Keyboard Registry Script☆105Updated 4 years ago
- Let's brute force this hotel's tv.☆78Updated 5 years ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆236Updated 2 months ago
- A static analysis file format checker.☆239Updated 4 years ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 4 years ago
- Web on top of any protocol☆114Updated 5 years ago
- Repository demonstrating the Capital One breach on your AWS account☆243Updated 4 years ago
- Template for sending a GitHub webhook over a zero trust, private network based on https://github.com/openziti/ziti☆58Updated 2 years ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆62Updated 3 months ago
- A Passive SSH back-end and scanner.☆102Updated 3 months ago
- Writeup for the DEF CON 30 badge challenge☆72Updated 2 years ago
- Mike Lindell's cybersymposium files☆48Updated 3 years ago
- Open-source vulnerability disclosure policy templates.☆65Updated 3 years ago
- An Open Letter to the OWASP Board☆106Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- Make bar charts on the terminal.☆90Updated 4 years ago
- ☆5Updated 2 years ago
- ☆145Updated last year
- Azure as an external process source for psDoom-ng☆85Updated 2 years ago
- Utility to find AES keys in running processes☆336Updated 2 years ago
- Scans every git push to your Github organisations to find unwanted secrets.☆87Updated last month