☆12Sep 18, 2015Updated 10 years ago
Alternatives and similar repositories for davwiki
Users that are interested in davwiki are comparing it to the libraries listed below
Sorting:
- ☆16Mar 10, 2017Updated 8 years ago
- 2019☆11Aug 11, 2018Updated 7 years ago
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- ☆11Apr 2, 2025Updated 11 months ago
- A syntactically aware search-and-replace tool for Python.☆15Jul 15, 2025Updated 7 months ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- Demonstration of a pure Java Certificate Authority and HTTPS client and servers☆12Jan 26, 2026Updated last month
- ☆12Nov 21, 2023Updated 2 years ago
- ☆11Jul 10, 2024Updated last year
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- Misspelled Words In Context☆38Feb 3, 2026Updated 3 weeks ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Dll hijack -- just one macro☆13Jul 3, 2023Updated 2 years ago
- ☆15Oct 29, 2024Updated last year
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Cracking Passwords with Neural Networks☆11Nov 18, 2020Updated 5 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Python library for get reports from GnuCash to xlsx files☆10Nov 29, 2020Updated 5 years ago
- Elevated - The Project☆16Jul 2, 2025Updated 8 months ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 8 months ago
- ☆15May 30, 2025Updated 9 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Tutorial Git dalam Bahasa Indonesia☆17Jan 13, 2011Updated 15 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- ☆13Dec 28, 2024Updated last year
- ☆10Mar 28, 2021Updated 4 years ago
- NVD API 2.0 for python☆12Sep 26, 2024Updated last year
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- This is a simple python binding of Stag Fiducial Marker Detection System☆12Mar 7, 2022Updated 3 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Rust library for multi-file readahead / dropbehind☆14May 31, 2017Updated 8 years ago