☆21Jun 6, 2023Updated 2 years ago
Alternatives and similar repositories for pdfid
Users that are interested in pdfid are comparing it to the libraries listed below
Sorting:
- Detection Rule License (DRL)☆21Dec 27, 2024Updated last year
- ☆16Updated this week
- Capture a URL with Playwright☆30Feb 24, 2026Updated last week
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Fast lookup server for NSRL and other hash database used in digital forensic☆48Jan 26, 2026Updated last month
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- This software is an API in C++ to decode and encode ASTERIX data☆11Mar 8, 2018Updated 7 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Clone of PDFiD by Didier Stevens, as a package and with some improvements.☆53May 27, 2016Updated 9 years ago
- A Passive SSH back-end and scanner.☆104Jun 18, 2025Updated 8 months ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- A Full open-source/Full with Python/ interactive course for all who like to know "What are Communication Circuits?" from scratch to basic…☆12Jan 14, 2024Updated 2 years ago
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- GNU Readline based Python REPL without any external dependencies☆11Jun 12, 2023Updated 2 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- GPG Encrypts an IMAP folder☆12May 4, 2020Updated 5 years ago
- ☆10Apr 10, 2024Updated last year
- Research code and scripts used in the Silburt et al. (2021) EMNLP 2021 paper 'FANATIC: FAst Noise-Aware TopIc Clustering'☆11Jul 6, 2023Updated 2 years ago
- Python interface to the WikiTree API☆11Jul 25, 2024Updated last year
- ☆14Dec 6, 2023Updated 2 years ago
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Jan 16, 2026Updated last month
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated last month
- Python framework to solve crypto problems using grainofsalt and cryptominisat☆14May 24, 2022Updated 3 years ago
- Examples of authoring rich content for various academic subject areas in Jupyter notebooks☆12Nov 12, 2021Updated 4 years ago
- ☆14Oct 1, 2024Updated last year
- A more generic version of https://github.com/dataarts/armsglobe for visualizing source/destination data☆10Jul 5, 2016Updated 9 years ago
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago
- CISSP Books Free Download☆20Jul 27, 2024Updated last year
- ☆13Nov 12, 2024Updated last year
- Five pillars of computational reproducibility☆11Feb 6, 2024Updated 2 years ago
- Powered by Library Genesis☆23Jun 4, 2016Updated 9 years ago
- ☆11May 2, 2025Updated 10 months ago