miaouPlop / GWT-3DView external linksLinks
☆24Feb 12, 2016Updated 10 years ago
Alternatives and similar repositories for GWT-3D
Users that are interested in GWT-3D are comparing it to the libraries listed below
Sorting:
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated 11 months ago
- A set of tools made to assist in penetration testing GWT applications. Additional details about these tools can be found on my OWASP Apps…☆238Jan 21, 2020Updated 6 years ago
- Collection of scanner checks missing in Burp☆15Apr 22, 2022Updated 3 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite.☆58May 1, 2015Updated 10 years ago
- nmapParser.py is a tool developed for consultants doing nmap scans against a large range of hosts. I found it easy to identify hosts that…☆13Jan 19, 2016Updated 10 years ago
- A relatively flexible tool to parse mimikatz output☆35Oct 11, 2016Updated 9 years ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Clean useless .sdr folders in your Kindle.☆16Feb 5, 2026Updated last week
- xosVer Get remote host os version info☆14Aug 20, 2015Updated 10 years ago
- Armadito module for PDF document analysis.☆18Aug 3, 2017Updated 8 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆26Apr 14, 2015Updated 10 years ago
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- Splunk Web Shell☆51Mar 25, 2015Updated 10 years ago
- My collection of dockerfiles☆24Feb 15, 2016Updated 10 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Apr 18, 2017Updated 8 years ago
- Microprocessor 2 Lab Template☆11Apr 29, 2024Updated last year
- Utility to decompress Linux swsusp hibernation file.☆28Aug 11, 2021Updated 4 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- One off Scripts repo☆24Jan 20, 2023Updated 3 years ago
- A tool for calculating necessary SQL Server permissions☆23Feb 9, 2015Updated 11 years ago
- ☆25Nov 2, 2021Updated 4 years ago
- xortigate-cve-2023-27997☆65Oct 12, 2023Updated 2 years ago
- OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner, data miner and RSA key-restore tools.☆97Jun 18, 2014Updated 11 years ago
- Add headers to all Burp requests to bypass some WAF products☆330Jan 28, 2018Updated 8 years ago
- Certificate Expiration Monitor script☆27Oct 10, 2018Updated 7 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- GKE CIS 1.1.0 Benchmark InSpec Profile☆25Sep 7, 2021Updated 4 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆35Feb 1, 2017Updated 9 years ago
- ☆32Oct 20, 2018Updated 7 years ago
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Jan 30, 2017Updated 9 years ago
- A domain/ip fuzzing tool for vulnerability mining☆99Mar 13, 2015Updated 10 years ago
- My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)☆41Dec 3, 2025Updated 2 months ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated last month
- ☆83Jan 29, 2016Updated 10 years ago
- ARCHIVED - Materials for running a Team-Based Inquiry Learning linear algebra course☆10Jul 30, 2024Updated last year
- Proof-of-concept exploit code for CVE-2016-5696☆75Aug 30, 2016Updated 9 years ago