☆67Jan 8, 2026Updated 3 months ago
Alternatives and similar repositories for LAP
Users that are interested in LAP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A series of python scripts to extract information from SQLite Data Files☆21Nov 15, 2025Updated 5 months ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 8 months ago
- Slides and resources from MCTTP 2025 Talk☆70Oct 26, 2025Updated 6 months ago
- ☆83Feb 4, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆108Apr 8, 2026Updated 3 weeks ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated 2 months ago
- A fast, deterministic, non-cryptographic hash for use in hash tables for Rust☆15Jan 12, 2021Updated 5 years ago
- Here you can find writeups from various CTFs that I've participated in.☆12Jul 30, 2023Updated 2 years ago
- This is a powershell module to help implement the AD Tier Model☆17Feb 17, 2026Updated 2 months ago
- HTB recon tool to simplify part of the enumeration process☆13May 14, 2025Updated 11 months ago
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- ☆16Aug 25, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Exploits for some of the vulnerabilities I have discovered☆18Aug 3, 2020Updated 5 years ago
- Opengraph-Compatible JSON Generator for BloodHound☆28Mar 30, 2026Updated last month
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- 🐲 separate user on windows + firejail on linux + sandbox-exec on macOS☆21Feb 21, 2026Updated 2 months ago
- ☆12Aug 27, 2025Updated 8 months ago
- ☆54Oct 6, 2025Updated 6 months ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- The SOLVE-IT knowledge base for digital forensics☆78Apr 26, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Sun NFS 2.0 Release☆24Sep 16, 2025Updated 7 months ago
- ☆19May 1, 2025Updated last year
- Extract the Procedures (TTP) from CTI reports☆18Dec 13, 2025Updated 4 months ago
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆70Feb 5, 2026Updated 3 months ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆309Apr 26, 2026Updated last week
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆62Apr 18, 2019Updated 7 years ago
- C# Desktop GUI application that either performs YARA scan locally or prepares the scan in Active Directory domain environment with a few …☆36Dec 1, 2021Updated 4 years ago
- A basic RSA encryption and decryption system. It establishes a client-server connection using sockets, and the client sends an encrypted …☆13Apr 13, 2023Updated 3 years ago
- Forensic tool for acquisition, triage and analysis of remote block devices via iSCSI protocol.☆44Oct 25, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Tools and scripts to deploy and manage OpenRelik instances☆16Mar 23, 2026Updated last month
- A Vulnerablity Radar That Runs With GIthub Actions☆59Apr 28, 2026Updated last week
- Block abused TLDs in Tenant Allow BlockList☆15Jan 21, 2026Updated 3 months ago
- ☆28Mar 29, 2022Updated 4 years ago
- ☆23Jun 17, 2024Updated last year
- ☆29May 30, 2024Updated last year
- A collection of my public security advisories.☆28Nov 10, 2025Updated 5 months ago