☆61Mar 26, 2021Updated 5 years ago
Alternatives and similar repositories for dollhouse
Users that are interested in dollhouse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- go-audit is an alternative to the auditd daemon that ships with many distros☆16Oct 28, 2018Updated 7 years ago
- Android attempt at PoC CVE-2016-8655☆13Jul 1, 2017Updated 8 years ago
- AES-NI bruteforcer for bad Character Sets☆10Jan 17, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Go package for resolving IP addresses back to published cloud provider public ranges☆27May 8, 2018Updated 8 years ago
- Coordinated vulnerability disclosure (CVD) for security discoveries, bug reporting, breach analysis, etc.☆19Apr 14, 2025Updated last year
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.☆140Sep 23, 2024Updated last year
- Bodhi - Client-side Vulnerability Playground☆123Jun 1, 2021Updated 4 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- Read and write Fortify Project (FPR) files in Python☆10Sep 18, 2014Updated 11 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- SUB/PUSH/POP based ASCII shellcode encoder☆23Sep 7, 2017Updated 8 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Feb 20, 2019Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Mar 14, 2017Updated 9 years ago
- Arduino-based network monitor☆24Sep 19, 2011Updated 14 years ago
- Clone me and get your own authentic Parsia-Clone today.☆45Apr 22, 2026Updated 2 weeks ago
- anomaly detection for time series databases like prometheus☆15Dec 11, 2017Updated 8 years ago
- Security Capture The Flag (CTF) competition writeups and learning notes.☆15Feb 14, 2017Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Shared build infrastructure for Prometheus projects☆12Aug 19, 2016Updated 9 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 7 years ago
- A REST API security testing framework.☆327Dec 4, 2021Updated 4 years ago
- Description here☆12Aug 17, 2022Updated 3 years ago
- CLI to bring your messages back from SQS Dead Letter Queues.☆13Oct 26, 2023Updated 2 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆13May 29, 2018Updated 7 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆11Aug 1, 2021Updated 4 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for m…☆13Feb 1, 2022Updated 4 years ago
- Webshell plugin that works on any Atlassian product employing their plugin framework☆27Nov 20, 2017Updated 8 years ago
- Mini CA☆12Sep 7, 2015Updated 10 years ago
- Dynomite Cluster Checker checks if a Dynomite cluster is working properly via Dyno.☆10Jan 22, 2020Updated 6 years ago
- ☆122Mar 6, 2018Updated 8 years ago
- Lightweight password strength checker that enforces a strong password policy.☆17Jan 3, 2023Updated 3 years ago
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆24Jun 19, 2017Updated 8 years ago