Man-in-the-middle made easy!
☆15Mar 25, 2020Updated 6 years ago
Alternatives and similar repositories for mme
Users that are interested in mme are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- ☆14Jun 1, 2023Updated 2 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆11Updated this week
- Zeek Ethercat Parser - CISA ICSNPP☆18Mar 3, 2026Updated 3 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Industrial Control Systems Network Protocol Parsers (ICSNPP) - Genisys over TCP/IP☆22Mar 3, 2026Updated 3 weeks ago
- Zeek BACnet Parser - CISA ICSNPP☆23Nov 6, 2025Updated 4 months ago
- Small collection of Active Directory pentesting tools.☆32Jan 29, 2024Updated 2 years ago
- Zeek Modbus Extension Scripts - CISA ICSNPP☆21Dec 16, 2025Updated 3 months ago
- Damn Vulnerable Chemical Process - Vinyl Acetate Monomer☆22Dec 13, 2015Updated 10 years ago
- Examples of security scenarios in IMUNES☆15Sep 26, 2018Updated 7 years ago
- Contains the code for the Flexus cycle-accurate simulator, used in QFlex.☆14Updated this week
- ☆15Dec 7, 2022Updated 3 years ago
- ☆22May 11, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago
- ☆11Dec 13, 2021Updated 4 years ago
- Zeek Ethernet/IP and CIP Parser - CISA ICSNPP☆26Mar 3, 2026Updated 3 weeks ago
- Open-source, enterprise-grade threat modeling platform☆32Updated this week
- A platform to create, catalog and deploy tests for tools such as Gauntlt, AttackIQ and Metasploit.☆17Jul 22, 2016Updated 9 years ago
- The Offensive (Web, etc) Testing Framework (aka owtf) is an OWASP+PTES-focused try to unite great tools and facilitate pen testing☆21Jan 6, 2012Updated 14 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- STIX Tools & Scripts☆47Dec 2, 2013Updated 12 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Aug 5, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Simulation of manufacturing systems☆15Mar 15, 2022Updated 4 years ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆32Sep 4, 2024Updated last year
- Data and scripts for examining the Department of Defense's 1033 excess equipment program☆17Jun 21, 2022Updated 3 years ago
- Deploy a Docker Swarm cluster on AWS using Amazon Echo☆15Apr 22, 2018Updated 7 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- ☆14Nov 15, 2020Updated 5 years ago
- Leetcode and other coding challenges solved in Python, C++ and Go.☆12Sep 15, 2023Updated 2 years ago
- ☆16Dec 4, 2023Updated 2 years ago
- Dll hijack -- just one macro☆13Jul 3, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14Updated this week
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Safety Risk Reliability Model Library☆12Jan 23, 2025Updated last year
- A shell script that translates strings of characters and sends them to a VirtualBox guest☆19Nov 8, 2018Updated 7 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago