Clone Git repository faster. Eliminates the repetitive typing of git clone and copy-pasting the url
☆16Dec 17, 2017Updated 8 years ago
Alternatives and similar repositories for Fast-Git-Clone
Users that are interested in Fast-Git-Clone are comparing it to the libraries listed below
Sorting:
- This repository contains all the talk materials and ebook from the talk System Hardening Using Ansible given at All Day DevOps 2016 onlin…☆12Nov 16, 2016Updated 9 years ago
- Designed and Implemented a Web Application Firewall as an Apache module that "sits" in-front of a web server. The WAF is designed to stop…☆16Jan 11, 2017Updated 9 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- JEB Scripts☆21Nov 28, 2014Updated 11 years ago
- Fork of iSec Partners Android Intent Fuzzer (https://www.isecpartners.com/tools/mobile-security/intent-fuzzer.aspx)☆16Feb 10, 2015Updated 11 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Get all AD objects which are hidden from you☆18Aug 21, 2017Updated 8 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 3 years ago
- Vagrant instance to test Aptly and Jenkins Builds☆25Mar 19, 2016Updated 9 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Dec 7, 2016Updated 9 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- ☆20Oct 22, 2019Updated 6 years ago
- DragonJAR Automatic Windows Forensic☆13May 23, 2017Updated 8 years ago
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago
- Reverse IP Lookup Tool that allows you to use an IP address to identify all websites hosted on a server.☆10Jun 29, 2016Updated 9 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Examples related to Amazon Lightsail☆12Jul 17, 2024Updated last year
- Find API keys in your code.☆40Aug 18, 2021Updated 4 years ago
- MongoDB Login Brute Forcer☆11Jun 22, 2014Updated 11 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Search Nmap and Metasploit scanning scripts.☆54Sep 18, 2017Updated 8 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- My Personal Library for CTF's☆12Apr 3, 2018Updated 7 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Build an SSL capable transparent proxying WiFi Access point with budget commodity hardware and Open Source software.☆15Mar 1, 2013Updated 13 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago