A command line Curses based json viewer and tabulator
☆30Aug 3, 2025Updated 7 months ago
Alternatives and similar repositories for jsonviewer
Users that are interested in jsonviewer are comparing it to the libraries listed below
Sorting:
- ☆27May 21, 2025Updated 10 months ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆23Jun 28, 2024Updated last year
- Simple root privilege escalation detection using eBPF 🐝☆35Feb 10, 2026Updated last month
- A collection of vibe reverse engineered binaries and malware (for educational purposes only)☆41Mar 3, 2026Updated 2 weeks ago
- An AI-powered assistant for hackers and security professionals built for Caido☆31Jan 24, 2026Updated last month
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆22Apr 23, 2025Updated 10 months ago
- ☆15Mar 21, 2025Updated last year
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated 3 weeks ago
- A curated blocklist of Autonomous System Numbers (ASNs) associated with VPN providers, datacenters, and hosting services commonly used fo…☆15Mar 11, 2026Updated last week
- A fast, deterministic, non-cryptographic hash for use in hash tables for Rust☆15Jan 12, 2021Updated 5 years ago
- Seamless AI Integration into Caido☆45Updated this week
- undust is a URL pattern generator that helps uncover archived, backup, and temporary files left behind on web servers. Given a URL, it ge…☆53Jul 17, 2025Updated 8 months ago
- This is a powershell module to help implement the AD Tier Model☆15Feb 17, 2026Updated last month
- c# reverse shell poc☆26Dec 22, 2025Updated 3 months ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated 2 months ago
- VHostChecker takes a csv list of targets in the form of domain,ip,port and runs 4 seperate connection checks to get a quick sense of how …☆33Sep 14, 2023Updated 2 years ago
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- 🐲 separate user on windows + firejail on linux + sandbox-exec on macOS☆21Feb 21, 2026Updated last month
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- A list of the best cybersecurity research related blogs.☆33May 26, 2025Updated 9 months ago
- Fast Bug Bounty Script☆39Jan 15, 2025Updated last year
- ☆17Mar 8, 2024Updated 2 years ago
- Sun NFS 2.0 Release☆24Sep 16, 2025Updated 6 months ago
- ☆19May 1, 2025Updated 10 months ago
- ☆33Updated this week
- A Vulnerablity Radar That Runs With GIthub Actions☆46Mar 12, 2026Updated last week
- ☆76Jan 27, 2025Updated last year
- Offline AI Security Assistant for Air-Gapped Pentesting☆73Feb 22, 2026Updated last month
- Mishky's AD Range & The Escalation Path from Hell, version 1.1☆19Feb 5, 2026Updated last month
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- ☆20Jan 25, 2019Updated 7 years ago
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 4 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆18Feb 23, 2026Updated 3 weeks ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- ☆15May 3, 2024Updated last year
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago