wall of sheep for security training;
☆27Sep 5, 2017Updated 8 years ago
Alternatives and similar repositories for wallofsheeps
Users that are interested in wallofsheeps are comparing it to the libraries listed below
Sorting:
- Eagle is a Web Application Attack and Audit Framework. Eagle has moved to Bitbucket.☆11Nov 21, 2016Updated 9 years ago
- 烛龙 -- 基于Docker的环境快速搭建系统☆12Dec 2, 2016Updated 9 years ago
- 一个HIDS agent端的demo☆17Feb 29, 2020Updated 6 years ago
- A light PAM module to log user's username and password.☆15Mar 16, 2018Updated 7 years ago
- Simple Python bindings for the Hyperscan project.☆20Feb 12, 2017Updated 9 years ago
- From The Shadow : )☆21Apr 13, 2019Updated 6 years ago
- ☆23Jun 2, 2017Updated 8 years ago
- PPA Repo for DragonOS FocalX☆39Jan 18, 2025Updated last year
- luna webscanner☆289Dec 6, 2023Updated 2 years ago
- use python to parse nginx☆25Nov 1, 2018Updated 7 years ago
- jre8u20 gadget☆34May 23, 2021Updated 4 years ago
- DOOM是在thorn上实现的分布式任务分发的ip端口漏洞扫描器☆136Dec 1, 2015Updated 10 years ago
- A wifi-enabled touch light for keeping in contact with friends and family☆13Feb 25, 2025Updated last year
- Install AAB is a script that helps with installing an AAB file into a connected Android device☆13Feb 7, 2024Updated 2 years ago
- AREDN Mesh Map☆13Jan 12, 2026Updated last month
- ☆13Mar 28, 2024Updated last year
- Ph4nt0m Webzine☆40Mar 21, 2015Updated 10 years ago
- ☆212Apr 17, 2017Updated 8 years ago
- mssql 终端连接工具|命令执行☆40Sep 29, 2019Updated 6 years ago
- 一款Python 3编写的Struts2安全检测集成工具☆35Jul 13, 2016Updated 9 years ago
- A 10Gbps UDP Reverse Proxy for Realtime Processing☆10Oct 29, 2013Updated 12 years ago
- Blog aggregator for pegelinux community☆10Dec 9, 2022Updated 3 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 6 months ago
- TRON implemented on a cloth modelling grid☆74Dec 12, 2014Updated 11 years ago
- DNA as an information storage medium using either 4-base codon or binary representations of 256-ASCII☆11Sep 6, 2013Updated 12 years ago
- ☆16Aug 25, 2025Updated 6 months ago
- Kubernetes deployment manifests for an Ethereum 2 Prysm Validator (testnet only and a little bit outdated)☆12Nov 5, 2021Updated 4 years ago
- Resolve Skype accounts by phone number with API interface☆13Jul 16, 2023Updated 2 years ago
- 基于 RabbitMQ 中间件的爬虫的 Ruby 实现 [Developing]☆13Oct 9, 2018Updated 7 years ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- IP格式整理脚本☆10Nov 11, 2021Updated 4 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- Python client library for the ClamAV antivirus.☆12May 15, 2025Updated 9 months ago
- Detecting fake news articles by analyzing patterns in writing.☆10Mar 30, 2020Updated 5 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- PostScript examples useful for attacking Ghostscript.☆13Aug 1, 2024Updated last year
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- The official SDK for Aave V3 👻.☆25Feb 12, 2026Updated 2 weeks ago