Loot email addresses from commit entries
☆58Aug 24, 2022Updated 3 years ago
Alternatives and similar repositories for githump
Users that are interested in githump are comparing it to the libraries listed below
Sorting:
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆70Jul 26, 2018Updated 7 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- Ghidra script which fully parses COFF files☆12Oct 18, 2024Updated last year
- Simple bash script to enumerate Linux machines☆13Nov 5, 2018Updated 7 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- CableTap public disclosure documents.☆78Jul 29, 2017Updated 8 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- ☆29Apr 20, 2018Updated 7 years ago
- Created by Jeffrey Martin via the GitHub Connector☆50Feb 13, 2025Updated last year
- Cowrie Honeypot Obscurer☆17Oct 14, 2020Updated 5 years ago
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- lsnfc is a simple command that lists tags which are in your NFC device field☆29Apr 7, 2015Updated 10 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Internet Radio based on the Beaglebone Black platform☆15Mar 4, 2016Updated 10 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13May 8, 2018Updated 7 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- ☆11Oct 18, 2019Updated 6 years ago
- An On-The-Cloud free "greybox" box scanner for various purposes.☆14Nov 21, 2017Updated 8 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Sep 25, 2017Updated 8 years ago
- LinkedInt: A LinkedIn scraper for reconnaissance during adversary simulation☆489May 23, 2023Updated 2 years ago
- Enterprise WPA Wireless Tool Suite☆87Sep 13, 2022Updated 3 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Docker Automated Build for Security Testing Tools☆14Apr 8, 2022Updated 3 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Development repository for the snort cookbook☆27Updated this week
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- CDPO is a tool to validate, de-duplicate, combine, query, and encrypt track data recovered from a breach.☆15Jun 23, 2017Updated 8 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago