Wintermute Endpoint Search: Parse source code pulling out endpoints, parameters, and a bunch of other stuff
☆14May 20, 2019Updated 6 years ago
Alternatives and similar repositories for wes
Users that are interested in wes are comparing it to the libraries listed below
Sorting:
- Another Vulnerability Auditor - Community Edition☆13Jun 1, 2021Updated 4 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 3 years ago
- Identify web application versions☆18Apr 14, 2017Updated 8 years ago
- Application whitelisting/blacklisting & end-user notifications for GSuite☆14Apr 19, 2018Updated 7 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- efficient linux security monitoring☆26Jul 8, 2018Updated 7 years ago
- Malware management program and tools☆27Dec 16, 2015Updated 10 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- ☆10Updated this week
- This is a small script to make the local exploitation process easier. It downloads the precompiled exploit for x86 and x64 architectures …☆31Aug 30, 2017Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Sample code to show how to create an in-memory RAG☆10Mar 10, 2024Updated last year
- Discrete signal processing tool for side chanel data leakage attacks and analysis. Air-gapped keylogger PoC.☆11Oct 31, 2023Updated 2 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- build system to cross-compile cydia packages for cydia.radare.org☆10Aug 23, 2019Updated 6 years ago
- Gradle plugin for integrating with HCL AppScan Source☆13Jan 29, 2026Updated last month
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- general-purpose fast, stateless, and deterministic feature extractor written in golang for use in machine learning☆12Mar 17, 2018Updated 7 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- A websocket proxy☆13Nov 13, 2017Updated 8 years ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆26Jul 11, 2025Updated 7 months ago
- Class to help with adding logging function in smali output from 3rd party Android apps.☆10May 20, 2014Updated 11 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- Go Based Lightweight RAG / LLM Tool with CLI + API☆14Sep 28, 2023Updated 2 years ago
- this is a tcl script for unpacking bitrock packed archives☆16Sep 27, 2020Updated 5 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Kernel based auditing for Mac, BSD and Linux. Leverages the Audit Subsystem, OpenBSM (eventually) and Apple's Endpoint Security Framework☆12Mar 6, 2020Updated 5 years ago
- ☆18Nov 13, 2014Updated 11 years ago
- Running TaintDroid from the command line and analyze output☆17Mar 28, 2012Updated 13 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- ☆12Jun 13, 2016Updated 9 years ago