isaudits / parsersView external linksLinks
Miscellaneous parsing scripts for penetration testing
☆12Jul 17, 2023Updated 2 years ago
Alternatives and similar repositories for parsers
Users that are interested in parsers are comparing it to the libraries listed below
Sorting:
- Detection scripts for MDM deployment to identify OpenClaw installations on managed devices.☆53Feb 5, 2026Updated last week
- ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vu…☆21Oct 6, 2025Updated 4 months ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Secure access cloud terraform provider☆13Updated this week
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Repository for various tools around security☆41Jul 18, 2024Updated last year
- A powerful proxy checker that checks and evaluates proxies for speed, availability, and anonymity across multiple protocols (HTTP, HTTPS,…☆12Oct 31, 2025Updated 3 months ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- ☆10Jun 30, 2016Updated 9 years ago
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Feb 4, 2026Updated last week
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Outputs vs. outcomes: what's the different and why does it matter?☆16Apr 14, 2025Updated 10 months ago
- Tecnologia Assistiva com uso de IA para audiodescrição e transcrição de audios no Whatsapp☆11Feb 7, 2026Updated last week
- ☆12Mar 14, 2022Updated 3 years ago
- ☆10Aug 11, 2025Updated 6 months ago
- AWS Live Response☆11Sep 19, 2017Updated 8 years ago
- BSoD PoC for CVE-2016-0051 (MS-016)☆10Feb 22, 2016Updated 9 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 10 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 9 months ago
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆15Nov 7, 2021Updated 4 years ago
- BBEdit codeless language module for CMake.☆16Mar 24, 2024Updated last year
- Simple RESTful API implementation on Node.js + Express + MongoDB.☆10Jan 23, 2023Updated 3 years ago
- Consolidated demo and source links from Bryant Zadegan and Ryan Lester's Black Hat / DEF CON talk "Abusing Bleeding Edge Web Standards fo…☆11Aug 19, 2017Updated 8 years ago
- ☆10Jul 6, 2016Updated 9 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- A charm to deploy and initialize Vault on Kubernetes and Machine models. Secure, store and tightly control access to tokens, passwords, c…☆12Updated this week
- simple storage helper inspired by the redis api☆19Jun 30, 2016Updated 9 years ago
- Wiegand data logger, replay device and micro door-controller☆14Jan 5, 2024Updated 2 years ago
- A third-party MCP server that enable all IDEs to access Claude Code Skills capabilities☆19Feb 8, 2026Updated last week
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Asynchronous public DNS auditing tool☆11May 22, 2023Updated 2 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆10Nov 24, 2015Updated 10 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago