An automation framework for CyberSecurity Tools
☆12Dec 6, 2025Updated 3 months ago
Alternatives and similar repositories for PenPal
Users that are interested in PenPal are comparing it to the libraries listed below
Sorting:
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- Raspberry Pi powered Digital Clock for Amateur Radio using TM1637 4 digit displays☆11Mar 20, 2021Updated 4 years ago
- Python Duo Push API☆42May 31, 2025Updated 9 months ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- 🔥 CEHv12 Certificate documentation 📚☆10Jun 29, 2023Updated 2 years ago
- ☆12Feb 16, 2023Updated 3 years ago
- Virtual Security Operations Center☆52Aug 28, 2023Updated 2 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- The Zonemaster GUI - part of the Zonemaster project☆17Updated this week
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- urlscan.io API wrapper for Ruby☆13Oct 16, 2023Updated 2 years ago
- Script for downloading Burp Suite extension files☆11Jan 29, 2024Updated 2 years ago
- list of TryHackMe Free rooms with a guide to basic pathways.☆12Aug 14, 2023Updated 2 years ago
- ✌ ✌🏻 ✌🏼 ✌🏽 ✌🏾 ✌🏿☆13Jan 25, 2023Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆14Aug 23, 2022Updated 3 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- A set of homebrew formulae to install virt-manager and virt-viewer on macOS☆11Feb 17, 2023Updated 3 years ago
- A simple client/server app to render widgets defined by a JSON file onto a web browser page.☆10Oct 24, 2023Updated 2 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- ☆13Dec 30, 2024Updated last year
- Bulk scanning of Hosts and IPs using the Shodan API☆10Apr 26, 2022Updated 3 years ago
- Utility to attempt to find the passphrase of a GPG secret key☆10May 23, 2024Updated last year
- Wrapper script for letsencrypt☆11May 27, 2020Updated 5 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago
- Processing Traefik logs by splitting them into separate folders based on the "ServiceName" field (e.g., "9-service@http") and implementin…☆16Apr 20, 2025Updated 10 months ago
- Movie Streaming Platform☆18Feb 24, 2026Updated last week
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- ☆11Dec 13, 2021Updated 4 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- ☆16May 9, 2016Updated 9 years ago
- This repository contains a script created by Truesec CSIRT team which can be used to identify signs of compromise and to some extent, mit…☆11Jul 7, 2021Updated 4 years ago
- Sistema hardware basado en Arduino para detectar Rubber Duckies, evitando su conexión física al PC y permitiendo conectar pendrives o tec…☆12Jul 28, 2022Updated 3 years ago
- my-nuclei-templates☆12Dec 9, 2021Updated 4 years ago
- The home of the Red Eclipse website.☆12Sep 10, 2025Updated 5 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year