open source software for journalists to investigate all of the data in the BlueLeaks dataset
☆33Feb 27, 2026Updated last week
Alternatives and similar repositories for blueleaks-explorer
Users that are interested in blueleaks-explorer are comparing it to the libraries listed below
Sorting:
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Feb 23, 2026Updated 2 weeks ago
- ☆25Dec 24, 2024Updated last year
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆39Aug 29, 2023Updated 2 years ago
- HLTB Proxy API☆13Oct 14, 2025Updated 4 months ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- ☆13Feb 28, 2026Updated last week
- A copy of the latest version of MVSIS☆12Apr 18, 2021Updated 4 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- A collection of more or less small code snippets for Siemens S7 controllers☆11Dec 16, 2022Updated 3 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- Beautify HTML Astro build result☆13Jul 26, 2023Updated 2 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- Skillets is the default holding place for useful Panhandler skillets. These are usually smaller one-off bits that may not require their o…☆13Apr 15, 2020Updated 5 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆42Aug 2, 2021Updated 4 years ago
- Website for the osm2pgsql project☆11Feb 28, 2026Updated last week
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- A collection of expired domains previously blocked by Russia's Roskomnadzor, now available for free registration. Reclaim the web! 🌐🔓☆11Feb 27, 2026Updated last week
- A project to translate the Voynich Manuscript into English☆11Jun 30, 2023Updated 2 years ago
- ☆12Feb 24, 2023Updated 3 years ago
- A fully-fledged network of yester-year to teach long forgotten security techniques☆10Feb 15, 2026Updated 3 weeks ago
- A set of simple tools for working with Datadog☆19Jul 28, 2020Updated 5 years ago
- The repo for the ViruSafe Backend project.☆11Jan 21, 2022Updated 4 years ago
- Sphincs+ implementation which uses minimal RAM☆14Aug 31, 2023Updated 2 years ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- A small tool to export your "attachments" (screenshots/images) from your discord backups☆10Aug 10, 2022Updated 3 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Jul 26, 2020Updated 5 years ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 6 years ago
- Tiny Regular Expression Matcher☆10May 23, 2019Updated 6 years ago
- ☆11May 17, 2019Updated 6 years ago
- Generate Software Bill of Materials (SBOM) from virtual machine disk images, without booting the VM.☆17Feb 20, 2026Updated 2 weeks ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago