☆26Jul 20, 2016Updated 9 years ago
Alternatives and similar repositories for Cable-modems
Users that are interested in Cable-modems are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ExtendedMacro - BurpSuite plugin providing extended macro functionality☆15Jan 13, 2021Updated 5 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- volby.digital☆11Apr 30, 2024Updated 2 years ago
- ☆11May 19, 2017Updated 8 years ago
- OfficeBrute - brute force protected word documents☆23Feb 4, 2018Updated 8 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆18Feb 11, 2025Updated last year
- Talk given at DerbyCon and RuxCon 2016☆23Sep 23, 2016Updated 9 years ago
- ☆19Apr 21, 2026Updated last week
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Open-RMBT is an open source, multi-threaded bandwidth test written in Java and C.☆20Jul 8, 2016Updated 9 years ago
- Raw format video reader for VapourSynth☆10Mar 15, 2021Updated 5 years ago
- Windows OpenStack Heat templates☆14Apr 15, 2014Updated 12 years ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 14 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Argument Injection in Dragonfly Ruby Gem☆16May 26, 2021Updated 4 years ago
- Home-Assistant custom integration adding a 1D Kalman filter☆12Dec 26, 2020Updated 5 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- Encode or decode base64 or base32 using a custom alphabet☆12Jan 29, 2019Updated 7 years ago
- An updated version Lady Ada's Wavebubble☆11May 30, 2013Updated 12 years ago
- SLURM file generator for bogons with AS0 as origin☆11Dec 6, 2023Updated 2 years ago
- A Routing Policy Specification Language(RPSL) parser with a focus on speed and correctness.☆15Apr 23, 2026Updated last week
- ☆13Jul 4, 2023Updated 2 years ago
- Proof of Concepts, Exploits☆28Apr 8, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Access Amazon's AWS Athena API via reticulate and AWS official Python boto3 module☆10Sep 24, 2018Updated 7 years ago
- A simple translator between the Horizion JSON format and the XMLTV format☆10Oct 24, 2022Updated 3 years ago
- OpenCore EFI config for Dell XPS 8940 & possibly G5 5090☆10May 14, 2021Updated 4 years ago
- collection of bro and bash scripts that when run from the same directory on Linux distro with bro installed, will pull information such a…☆12Mar 29, 2016Updated 10 years ago
- Malifar is a GPU-accelerated NSEC3 DNS zone dumper☆15Jun 4, 2024Updated last year
- Swipe Right On A New Peering Relationship☆15Jun 21, 2020Updated 5 years ago
- This is a Firefox WebExtension that monitors the browsing activity and automatically perform an automated XSS vulnerability scan by submi…☆18Jan 21, 2017Updated 9 years ago
- ☆14Apr 29, 2020Updated 6 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Splunk app for Threat hunting☆15Nov 15, 2018Updated 7 years ago
- Project for extracting proto files from the nest home website.☆13Dec 19, 2024Updated last year
- Wordpress Two-factor Authentication Brute-forcer☆19Oct 22, 2019Updated 6 years ago
- Generates long-lived access tokens for any given Facebook app and user credentials☆10May 25, 2017Updated 8 years ago
- Optimized Circuit Generation for Secure Multiparty Computation☆12Nov 25, 2019Updated 6 years ago
- ☆24Feb 6, 2017Updated 9 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago