Git-SVN clone from http://svn.code.sf.net/p/wapiti/code/
☆21Nov 7, 2013Updated 12 years ago
Alternatives and similar repositories for wapiti
Users that are interested in wapiti are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Nov 21, 2015Updated 10 years ago
- Crash and burn the Gibson to take out the Da Vinci virus☆13Dec 20, 2020Updated 5 years ago
- Server-side SDK to provide a simple REST API for distribution of security information.☆17May 11, 2016Updated 9 years ago
- Qemu build for macOS used by the self-contained `podman machine` installer☆23Jan 30, 2024Updated 2 years ago
- xResolver - Xbox Resolver and PSN Resolver with Gamertag IP Puller☆17Apr 27, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆11Oct 28, 2016Updated 9 years ago
- mlocate for Windows☆20Jun 27, 2020Updated 5 years ago
- ☆12May 2, 2017Updated 9 years ago
- Elastic meetup in Shenzhen 2016☆11Sep 26, 2017Updated 8 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- 简单、安全、高效、开源的PHP MVC框架☆17Jun 4, 2020Updated 5 years ago
- Remot Desktop Checker (Au3-Source)☆10Jun 25, 2018Updated 7 years ago
- Customised Nessus audit scripts☆15Sep 21, 2020Updated 5 years ago
- Hackme is a network security answer platform,Hackme网络安全答题平台☆10Nov 5, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Windows 11 ISO patcher☆24Sep 9, 2021Updated 4 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆20Apr 5, 2026Updated last month
- Clone of HATop with added TCP support☆16Jun 23, 2013Updated 12 years ago
- Scripts to get the most out of Tenable.io☆12Feb 10, 2021Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- Funny and easy xss platform☆18Sep 25, 2013Updated 12 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆66Jan 17, 2018Updated 8 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Apr 26, 2025Updated last year
- 用于检测composer项目的第三方依赖组件是否存在安全漏洞。☆21Apr 28, 2022Updated 4 years ago
- 分析访问日志使用iptables禁止过于频繁的IP(防DDOS,恶意访问,采集器)☆13Jun 4, 2015Updated 10 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- First iteration of ML based Feedback WAF☆59Mar 20, 2024Updated 2 years ago
- Testing MongoDB OpsManager using containers.☆13Mar 16, 2015Updated 11 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 10 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Kibana analytics and search dashboard for Elasticsearch☆11Oct 18, 2019Updated 6 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 5 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆22May 27, 2025Updated 11 months ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- Site fast fuzzing with chorme extension.☆24Feb 4, 2022Updated 4 years ago
- 用于检测gradle项目的第三方依赖组件是否存在安全漏洞。☆25Apr 12, 2022Updated 4 years ago