evilsocket / clipbudLinks
AI powered clipboard.
☆42Updated 2 weeks ago
Alternatives and similar repositories for clipbud
Users that are interested in clipbud are comparing it to the libraries listed below
Sorting:
- Register your Kubernetes IPs to monitor.shodan.io☆19Updated 2 years ago
- ☆18Updated 11 months ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- Network Traffic Fuzzer☆18Updated 9 months ago
- Provides an overview of the inner file structure of a PDF☆25Updated 3 years ago
- ☆16Updated 7 months ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆36Updated 3 years ago
- ☆20Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- AWS Testing and Reporting Management Tool☆20Updated 2 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- top usernames from azure survey 2025☆14Updated 5 months ago
- Haschcat Rules processor☆14Updated 2 years ago
- Configurable, Community driven, HTTP C2 Profile☆26Updated 3 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Updated 7 months ago
- Ansible scripts to build an attack box☆23Updated 7 years ago
- ☆60Updated 2 years ago
- Automated vulnerability discovery and annotation☆67Updated last year
- 🎥 Spytruder: Advanced RTSP Camera Discovery and Vulnerability Assessment Tool☆18Updated 2 months ago
- ☆16Updated last year
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆15Updated last year
- Research on abusing GitLab Runners☆26Updated 5 years ago
- Golang Shlyuz Implant Implementation☆13Updated 4 months ago
- details about DIAL protocol vulnerabilities☆30Updated last year
- ☆16Updated 5 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago