Not another SCA. Lists of interesting regular expressions for searching code for security issues. Think FuzzDB for SCA.
☆15Nov 30, 2016Updated 9 years ago
Alternatives and similar repositories for NotaSCA
Users that are interested in NotaSCA are comparing it to the libraries listed below
Sorting:
- Network statistics collection and graphing in Python☆17Sep 30, 2020Updated 5 years ago
- Radamsa fuzzer extension for Burp Suite☆23Jun 25, 2013Updated 12 years ago
- Public resources NB shares☆18Mar 7, 2016Updated 10 years ago
- Network Scout (NS) is an extension to Artillery. NS allows you to access log files from multiple clients.☆21May 2, 2016Updated 9 years ago
- Community curated list of templates for the OSINT template engine.☆23Jul 11, 2023Updated 2 years ago
- CSRF protection middleware for Go.☆16Apr 6, 2024Updated last year
- ☆74Jul 13, 2022Updated 3 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆46Aug 13, 2017Updated 8 years ago
- Simple development DNS server written in python☆26Dec 19, 2017Updated 8 years ago
- AWS S3 Bucket/Object Finder☆25Nov 11, 2017Updated 8 years ago
- An 802.11 probe request and beacon sniffer.☆14Mar 16, 2021Updated 5 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 6 years ago
- A Facedancer21 expansion board for the BeagleBone.☆23Mar 24, 2014Updated 11 years ago
- Bot to bypass instagram block feature☆10Jun 21, 2017Updated 8 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Mar 3, 2019Updated 7 years ago
- Windows Offline Common Password Hash Checker☆29Aug 9, 2016Updated 9 years ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆27Oct 1, 2023Updated 2 years ago
- Show differences between directory trees☆15Aug 9, 2025Updated 7 months ago
- Juice Jacking / Automatic Android Rooting based on Intel Edison using dirty c0w☆11Nov 16, 2016Updated 9 years ago
- A minimal REST api to query the [Unity Asset Store website](https://www.assetstore.unity3d.com).☆24Nov 1, 2014Updated 11 years ago
- ☆15Feb 1, 2019Updated 7 years ago
- Attack Knowledge Base☆101Jul 5, 2017Updated 8 years ago
- Practice Exercise from Data Analysis course of Udacity DAND☆15Dec 4, 2017Updated 8 years ago
- A WordPress plugin which adds keyboard shortcuts for navigation and actions☆24Oct 2, 2020Updated 5 years ago
- Embeddable forms to recruit research participants. Sends results to a Google Sheet, deployed via Google Tag Manager.☆14Jun 25, 2018Updated 7 years ago
- Client/server scripts designed to test outbound (egress) firewall rules.☆37Sep 9, 2013Updated 12 years ago
- Convert Sigma rules to LogRhythm searches☆23Feb 27, 2022Updated 4 years ago
- A simple little Python script that uses Impacket to check if SMBv1 is enabled on a remote host☆16Mar 9, 2017Updated 9 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 10 years ago
- badbucket checks your s3 bucket for common misconfigurations☆24Jun 25, 2017Updated 8 years ago
- ☆12May 9, 2017Updated 8 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Keyword Extraction system using Brown Clustering - (This version is trained to extract keywords from job listings)☆18Sep 16, 2014Updated 11 years ago
- Summary is a complete solution to extract the title, image and description from any URL.☆19Nov 25, 2023Updated 2 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- ☆10Feb 7, 2020Updated 6 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- An SSRF-preventing wrapper around Node's request module☆26May 10, 2018Updated 7 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago