jenyraval / MPT
☆14Updated 9 months ago
Alternatives and similar repositories for MPT:
Users that are interested in MPT are comparing it to the libraries listed below
- ☆16Updated 9 months ago
- ☆14Updated 2 months ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- ☆18Updated 6 months ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 10 months ago
- File integrity monitor proof-of-concept in PowerShell sends a message via Telegram when it detects changes to a specified directory. It c…☆11Updated 2 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- ☆17Updated 8 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- self-hosted Azure OSINT tool☆30Updated 7 months ago
- A simple way to exfiltrate data using spotify API☆18Updated last month
- Hash collisions and their exploitations☆9Updated 2 years ago
- Alpine hostapd-mana based RADIUS server☆10Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 6 months ago
- ☆28Updated last year
- ☆10Updated last year
- Damn Vulnerable Browser Extension (DVBE), previously named as Badly Coded Browser Extension (BCBE), is an open-source vulnerable Chrome E…☆24Updated last month
- ☆19Updated last year
- ☆18Updated last year
- AWS Testing and Reporting Management Tool☆20Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated last year
- External telegram feeder for AIL framework☆13Updated 2 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 11 months ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆14Updated 3 months ago
- Open YARA scan- and search engine☆22Updated 2 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year