exploitsecurityio / DVRPiLinks
DVRPi is a RaspberryPi 4B firmware designed to teach hardware hacking through intentional vulnerabilities.
☆40Updated last month
Alternatives and similar repositories for DVRPi
Users that are interested in DVRPi are comparing it to the libraries listed below
Sorting:
- ☆18Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 7 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- self-hosted Azure OSINT tool☆31Updated 5 months ago
- tool for identifying guest relationships between companies☆103Updated last year
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆47Updated last week
- Modular framework for automating triaging, malware analysis, and analyst workflows☆43Updated 7 months ago
- All kinds of tiny shells☆65Updated 2 years ago
- create a "simulated internet" cyber range environment☆19Updated 6 months ago
- Rebuild of portspoof in GO with additional features.☆24Updated last month
- EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identify…☆57Updated last week
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆65Updated last year
- ☆49Updated 9 months ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆23Updated 5 months ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated last week
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆117Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆31Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆50Updated 9 months ago
- ☆63Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆69Updated 2 weeks ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- A VS Code extension to preview XML nmap output☆44Updated 9 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆65Updated last year
- top usernames from azure survey 2025☆14Updated 7 months ago
- ☆78Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆49Updated 9 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 9 months ago