Static Website Generator
☆25Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for SWG
Users that are interested in SWG are comparing it to the libraries listed below
Sorting:
- A framework for secure and scalable network traffic analysis - https://netcap.io☆17May 8, 2019Updated 6 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Aug 23, 2017Updated 8 years ago
- A webpage monitor bot, currently used to monitor Twitter ToS.☆19Nov 10, 2022Updated 3 years ago
- GSM+GPRS Radio Access Network Node☆17Apr 24, 2015Updated 10 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Dec 22, 2013Updated 12 years ago
- A machine learning based GitHub bot for Issues.☆14Dec 6, 2018Updated 7 years ago
- This repository contains a class to decrypt SafeInCloud (https://www.safe-in-cloud.com/) database files and a couple of command line util…☆44Oct 12, 2019Updated 6 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- WiFi arsenal☆17May 19, 2020Updated 5 years ago
- ☆19Feb 8, 2021Updated 5 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Feb 10, 2021Updated 5 years ago
- Fast iOS executable dumper☆28Jun 25, 2014Updated 11 years ago
- ☆27Aug 9, 2021Updated 4 years ago
- A Modular Web Vulnerability Scanner☆51Jan 24, 2011Updated 15 years ago
- BioIdentify is a command line tool for fingerprints feature extraction, 1on1 match and 1onN match .☆22May 29, 2009Updated 16 years ago
- Backup scripts I use on my drives.☆25Nov 26, 2017Updated 8 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Dec 23, 2020Updated 5 years ago
- Secure URL-friendly unique string ID generator in <8 LOC☆14Jun 7, 2025Updated 9 months ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Jun 6, 2022Updated 3 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Accompanying code for blog post "Mapping iOS Persistence Attack Surface using Corellium"☆11Jun 10, 2025Updated 9 months ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 7 years ago
- Spy on your friend Android App☆12Feb 13, 2017Updated 9 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆86Mar 27, 2019Updated 6 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- A curated list of awesome big data frameworks, ressources and other awesomeness.☆17Oct 4, 2021Updated 4 years ago
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- WPScan is a black box WordPress vulnerability scanner.☆10Oct 6, 2017Updated 8 years ago
- Tool to remove unsupported arm64e slice from a dylib based on the iOS version☆12Dec 21, 2022Updated 3 years ago
- VulnWhisperer Stack (ELK + VulnWhisperer + OpenVAS + Nessus)☆13Aug 14, 2018Updated 7 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆13Nov 1, 2023Updated 2 years ago
- Extract domain from SSL Information☆15Nov 23, 2021Updated 4 years ago
- Collection of useful Ghidra utilities and references☆14Apr 9, 2024Updated last year
- Default syntax highlighter for GitBook☆12Aug 30, 2018Updated 7 years ago