IOC/Hash scanner and IDS layer 4 designed to be portable and fast
☆27Jan 28, 2026Updated 2 months ago
Alternatives and similar repositories for anubi
Users that are interested in anubi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MISP to Microsoft Defender integration☆17Feb 24, 2026Updated last month
- Outil de triage automatisé de différents types de collectes d'artefacts.☆18Dec 8, 2025Updated 4 months ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- rcracki_mt : used to perform a rainbow table attack on password hashes☆13Sep 25, 2015Updated 10 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Security Blogs - A simple aggregator for security news/blog☆25Mar 31, 2026Updated 2 weeks ago
- MuonFP is an enterprise ready, TCP passive fingerprinter written in Rust that has no external dependencies such as WireShark or other ope…☆29Mar 27, 2026Updated 2 weeks ago
- See here:☆43Dec 6, 2012Updated 13 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- A tutorial and resources for exploit development learners☆10Jan 25, 2021Updated 5 years ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- 🚀 Lightweight Python library for building production LLM applications with smart context management and automatic token optimization. Sa…☆37Dec 23, 2025Updated 3 months ago
- A web application for generating, parsing and validating, manipulating, visualizing and executing CACAO v2.0 playbooks.☆39Aug 27, 2025Updated 7 months ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆20Nov 26, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- ☆16Oct 6, 2023Updated 2 years ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 6 months ago
- User-agent Fuzzing Library. This repository holds data of all the user agents in the `user_agents.json` file, which can be used directly …☆17Apr 7, 2026Updated last week
- ☆20Jan 25, 2019Updated 7 years ago
- Here you can find video, slides and other stuff related to RomHack Conference since the beginning (2018). Enjoy!☆18Nov 26, 2025Updated 4 months ago
- ☆12Oct 9, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Rhino Update is a command-line utility script which will provide updates to items that do not hit the Ubuntu devel repositories, such as …☆16Nov 18, 2022Updated 3 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 11 months ago
- This project is an AI-powered Security Information and Event Management (SIEM) system designed for real-time threat detection and respons…☆21Nov 10, 2024Updated last year
- Home of https://redteam.guide☆15Apr 1, 2026Updated last week
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆59Mar 4, 2023Updated 3 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Jul 6, 2024Updated last year
- Random Code Store☆17Mar 27, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Python script to find subdomains☆11Aug 22, 2025Updated 7 months ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Feb 15, 2017Updated 9 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- import library.zip in memory, with the interface the same as zipimport.☆10Jan 10, 2026Updated 3 months ago