Connect directly to UNVR with UniFi Protect mobile app on a different subnet.
☆19Feb 21, 2024Updated 2 years ago
Alternatives and similar repositories for unifi-mimic
Users that are interested in unifi-mimic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- FreshRSS Picture Cache with Cloudflare Workers☆14Mar 4, 2023Updated 3 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- ☆21Nov 6, 2024Updated last year
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- Community A2A provider for the ai-sdk from vercel☆29Oct 14, 2025Updated 6 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 6 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- AWQL parser / lexers☆13Mar 27, 2017Updated 9 years ago
- ☆16Apr 14, 2020Updated 6 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- Git Smart HTTP Backend☆14Jul 4, 2017Updated 8 years ago
- The memfs package is an in memory filesystem for go.☆15Feb 24, 2026Updated 2 months ago
- 2d game library for go☆11Apr 7, 2021Updated 5 years ago
- A powerful proxy checker that checks and evaluates proxies for speed, availability, and anonymity across multiple protocols (HTTP, HTTPS,…☆12Apr 16, 2026Updated 2 weeks ago
- Trending Machine - Explore Github's trending page in the past.☆14Jul 1, 2016Updated 9 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vu…☆20Oct 6, 2025Updated 7 months ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- Emulate the handshake packets of an RDP server with python☆15Jun 26, 2018Updated 7 years ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- StackStorm pack with action aliases allowing to run Ansible in a ChatOps way☆10Feb 21, 2017Updated 9 years ago
- A Prometheus that scrapes a Blackbox Exporter with target as the probe target's name (re)labeled.☆13Jan 4, 2022Updated 4 years ago
- ☆41Dec 8, 2021Updated 4 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- Run DependencyCheck Against Your Orgs GitHub Repos.☆14Jan 5, 2018Updated 8 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Jun 30, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Apr 13, 2017Updated 9 years ago
- Wiegand data logger, replay device and micro door-controller☆14Jan 5, 2024Updated 2 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- golang rpc框架,支持数据加密传输☆13Mar 23, 2026Updated last month
- Golang Automation Framework for Cobalt Strike using the Rest API☆59Apr 10, 2026Updated 3 weeks ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago