kvaps / keepass-url-overridesView external linksLinks
Scripts for override urls in keepass2
☆51Dec 10, 2023Updated 2 years ago
Alternatives and similar repositories for keepass-url-overrides
Users that are interested in keepass-url-overrides are comparing it to the libraries listed below
Sorting:
- A small command line application that pulls temps of various hardware components using Open Hardware Monitor Lib, outputs info along with…☆12Feb 14, 2018Updated 8 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Provides a simple Python based proxy for running DNS over HTTPS to Google's DNS over HTTPS service.☆39Mar 10, 2025Updated 11 months ago
- My collection of dockerfiles☆24Feb 15, 2016Updated 10 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Sep 20, 2014Updated 11 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- Symbol REPL☆31Mar 4, 2018Updated 7 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- Mydata module for Dolibarr☆12Nov 15, 2020Updated 5 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- OCR with one note☆12Oct 26, 2019Updated 6 years ago
- ☆13Jul 11, 2020Updated 5 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- A relatively flexible tool to parse mimikatz output☆35Oct 11, 2016Updated 9 years ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Download the latest Palo Alto Networks content update☆13Aug 23, 2018Updated 7 years ago
- ☆10Dec 16, 2021Updated 4 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- ☆13Jul 7, 2025Updated 7 months ago
- [ALPHA] Make Python application installs easy as pie, for both users and developers.☆11Nov 2, 2023Updated 2 years ago
- Script for tracking file system changes☆19Jan 23, 2018Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- webshare is a CLI tool that provides web-interface for your local files☆13Dec 2, 2018Updated 7 years ago
- A small Python script that will automatically download the recipes of your recent deliveries from HelloFresh.☆12Nov 3, 2025Updated 3 months ago
- dirb is a system for creating, managing and searching complex directory structures☆10Dec 12, 2015Updated 10 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- Next Gen Nagios UI☆17Jul 14, 2014Updated 11 years ago
- RDP Credential Provider☆11Oct 29, 2025Updated 3 months ago
- A Thunderbird extension to enable one-click dialing direct from your address book☆12Oct 8, 2021Updated 4 years ago
- Encode powershell payload into bat files☆155Feb 1, 2018Updated 8 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆55Nov 15, 2022Updated 3 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 7 months ago
- Returns a list of all Public IP addresses being used by your AWS account. You can configure which regions you want to query.☆14Jun 7, 2020Updated 5 years ago