dxc-technology / ThreatDeckView external linksLinks
A cyber security-focused playing card game
☆17Jan 27, 2021Updated 5 years ago
Alternatives and similar repositories for ThreatDeck
Users that are interested in ThreatDeck are comparing it to the libraries listed below
Sorting:
- Get tweets and save file in JSON format without Twitter API☆11Jan 1, 2019Updated 7 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 5 years ago
- A collection of utilities to simplify the creation of Burp Suite plugins☆22Dec 14, 2023Updated 2 years ago
- CircleCI log and security configuration automations☆22Sep 20, 2020Updated 5 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- Generate a Employee monthly payslip download as pdf and send to their mail☆10Sep 18, 2022Updated 3 years ago
- ☆10Aug 4, 2022Updated 3 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Mar 14, 2019Updated 6 years ago
- Use your vim settings anywhere☆164Oct 27, 2014Updated 11 years ago
- simplified devcontainer features, compatible with arm64☆12Feb 11, 2025Updated last year
- A powerful containerized tool that automatically downloads, extracts, and scans packages from PyPI and npm for embedded secrets, API keys…☆18Jul 25, 2025Updated 6 months ago
- Network aware keylogger: broadcasting on your local area network.☆22Jul 29, 2013Updated 12 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Sample code for locating Particle Photons on your local network for direct client-server communication☆11Aug 4, 2016Updated 9 years ago
- ☆20Jan 25, 2019Updated 7 years ago
- python exploit for werkzeug debug shell command execution☆10Jun 26, 2017Updated 8 years ago
- script to brute force ssh or ftp passwords☆12Jul 22, 2016Updated 9 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- ☆11Apr 2, 2022Updated 3 years ago
- Discord Webhook Cannon is a C# multithreaded, open-source Discord Webhook flooder. It can be used to flood webhooks which are used in mal…☆10Mar 14, 2021Updated 4 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- ☆13Oct 12, 2023Updated 2 years ago
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 7 years ago
- Ansible based installer for OSX machines.☆12Jan 8, 2026Updated last month
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- Some simple scripts for decrypting passwords retrieved from a Manage Engine OpManager installation☆11Jan 28, 2016Updated 10 years ago
- Scan and categorize websites for rapid triage☆12Jun 23, 2022Updated 3 years ago
- Checks to see if a password is in the list of 300+ million passwords downloaded from https://haveibeenpwned.com/Passwords☆12Jun 10, 2024Updated last year
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- Command-line tool to search for malware samples in various repositories☆12Mar 3, 2022Updated 3 years ago
- Sleep obfuscation in golang based on ekko☆13Jan 16, 2024Updated 2 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Where I will be storing misc files with details / links used during the installation process, etc☆12Sep 9, 2025Updated 5 months ago
- Climb aboard the JWT Express and use JWTs in your Express app with ease!☆10Dec 11, 2017Updated 8 years ago
- e - a smart wrapper for $EDITOR☆29Apr 26, 2012Updated 13 years ago