A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and CVE.
☆17Mar 29, 2026Updated 2 weeks ago
Alternatives and similar repositories for Startup-SBOM
Users that are interested in Startup-SBOM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Mar 1, 2024Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated last year
- ☆17Jan 9, 2025Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- keep watching new bug bounty (vulnerability) postings.☆11Apr 7, 2024Updated 2 years ago
- IP画像业务安全版私有化部署SDK☆13Dec 8, 2022Updated 3 years ago
- ☆21Jan 8, 2026Updated 3 months ago
- Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.☆11Aug 14, 2024Updated last year
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆63Aug 18, 2025Updated 7 months ago
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- PassBreaker☆67Apr 5, 2024Updated 2 years ago
- PSX Anti-Piracy Protection Bypass Generator☆38May 29, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆14Nov 14, 2023Updated 2 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆88May 11, 2024Updated last year
- AWS Cloud Landscape Search Engine☆20Nov 29, 2023Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Jun 10, 2025Updated 10 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Join the REVEN community. Ask questions, talk about reverse engineering, discuss REVEN, and show off your work!☆13Nov 30, 2021Updated 4 years ago
- Source code of the paper "FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization"☆13Jan 6, 2026Updated 3 months ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- ☆45Mar 22, 2026Updated 3 weeks ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆78Jul 13, 2024Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Jun 22, 2024Updated last year
- Exploit for CVE-2024-4885☆17Jul 8, 2024Updated last year
- Effortlessly browse and manage your files with ease using Tiny File Manager [WH1Z-Edition], a compact single-file PHP file manager.☆25Feb 13, 2024Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Tool for analyzing SAP Secure Network Communications (SNC).☆60Apr 16, 2024Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆53Feb 22, 2024Updated 2 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆21May 9, 2017Updated 8 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆129Dec 23, 2025Updated 3 months ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 3 months ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52May 26, 2024Updated last year