fragtastic / cis-benchmark-converterView external linksLinks
Converts text dumps from CIS Benchmark PDFs to CSV & Excel formats.
☆64Jul 13, 2024Updated last year
Alternatives and similar repositories for cis-benchmark-converter
Users that are interested in cis-benchmark-converter are comparing it to the libraries listed below
Sorting:
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP …☆11Nov 3, 2020Updated 5 years ago
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Jun 22, 2015Updated 10 years ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆21May 7, 2024Updated last year
- ☆20Feb 13, 2016Updated 10 years ago
- Password lists generated by deep learning algorithms.☆34Jan 20, 2020Updated 6 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Random Hashcat Scrips☆35Oct 12, 2024Updated last year
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- ☆13Jun 26, 2025Updated 7 months ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Old scripts that I keep around in case I need to bash something☆12Mar 25, 2015Updated 10 years ago
- Reinforce good behaviour with a bark detector and deterrer☆11Jun 10, 2020Updated 5 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- Exploit for CVE-2018-7600.. called drupalgeddon2,☆11Apr 19, 2018Updated 7 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Determines whether the current OS X computer's firmware is up-to-date.☆10Feb 24, 2015Updated 10 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- Python3 Module to interact with the SonicWall® SonicOS API☆14Jan 6, 2025Updated last year
- Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injectio…☆16Jul 28, 2025Updated 6 months ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- A plugin for Obsidian that allows the creation of symlinks - for Windows, OS X and Linux only!☆13Oct 31, 2024Updated last year
- A GUI application for managing Solo v2 security keys☆11Updated this week
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- ☆14Oct 18, 2019Updated 6 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- ☆12May 22, 2018Updated 7 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- Datasette plugin providing a UI for executing SQL writes against the database☆12Nov 11, 2025Updated 3 months ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- Cyber Security Resources☆10Jan 25, 2024Updated 2 years ago
- Hey, Elon Chrome Extension☆12Nov 9, 2022Updated 3 years ago
- ☆12Feb 24, 2023Updated 2 years ago
- Upload SQLite database files to Datasette☆14Nov 10, 2025Updated 3 months ago
- This repository contains a collection of scripts that automatically configure a development Jamf Pro server on macOS.☆10Aug 30, 2017Updated 8 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- The repo for the ViruSafe Backend project.☆11Jan 21, 2022Updated 4 years ago