This Repository is specially created for the NL InfoSec Discord Channel
☆11Dec 19, 2021Updated 4 years ago
Alternatives and similar repositories for NLInfoSec-Repo
Users that are interested in NLInfoSec-Repo are comparing it to the libraries listed below
Sorting:
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- ☆12Apr 1, 2024Updated last year
- Use this software to enjoy Adobe Acrobat Pro version for Free.☆17Feb 1, 2021Updated 5 years ago
- Find and collect parts of a Keepass master key to recover it in plain text from a memory dump☆20Feb 1, 2024Updated 2 years ago
- Source code for 'Beginning C' by Ivor Horton☆13Mar 29, 2017Updated 8 years ago
- ☆11Oct 28, 2016Updated 9 years ago
- ☆18May 5, 2024Updated last year
- DEPRECATED Cisco Communications Manager (CUCM) VOIP Phone Info Web Application Server☆18Nov 17, 2023Updated 2 years ago
- ☆21Updated this week
- Paleta de componentes web para utilização no UniGUI☆25Apr 29, 2024Updated last year
- simple practical byzantine fault-tolerant☆21Feb 25, 2021Updated 5 years ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago
- tools, files, and scripts I use for PNPT and CRTO☆23Feb 21, 2022Updated 4 years ago
- ☆24Feb 6, 2017Updated 9 years ago
- Elastic Certified ElasticSearch Engineer Exam For 8.1☆33Jan 28, 2026Updated last month
- Web UI for WiiM Mini device☆31Oct 13, 2025Updated 4 months ago
- A Model Context Protocol server that provides access to Shodan API functionality☆40Jun 29, 2025Updated 8 months ago
- Automated pshtt, trustymail, and sslyze scanning☆30Feb 18, 2026Updated 2 weeks ago
- MSc Computer Science Master Program in The York University☆33Apr 15, 2024Updated last year
- Script om funda.nl in de gaten te houden☆34Jun 7, 2025Updated 8 months ago
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆37Jan 2, 2024Updated 2 years ago
- Source code for 'Beginning Python' by Magnus Lie Hetland☆33Mar 29, 2017Updated 8 years ago
- ☆31Mar 15, 2018Updated 7 years ago
- CSE 351: The Hardware/Software Interface (taught by Luis Ceze)☆34May 22, 2014Updated 11 years ago
- Cricket umpire assistance and ball tracking system using a single smartphone camera☆33Feb 12, 2019Updated 7 years ago
- ☆49Jun 14, 2022Updated 3 years ago
- A SAML implementation for Delphi developers☆40Sep 14, 2025Updated 5 months ago
- Please understand any use of these directly in competition can get you disqualified. These are simply examples for the sake of open sourc…☆29Jan 8, 2017Updated 9 years ago
- The packer templates we use to create our Virtual Machine templates for AuroraCompute☆33Aug 24, 2022Updated 3 years ago
- ☆42Jun 12, 2025Updated 8 months ago
- Samen werken aan de nieuwe Baseline Informatiebeveiliging Overheid: BIO2☆56Updated this week
- A database containing 22409485 clear and equivalent sha256 hash passwords☆39Feb 10, 2021Updated 5 years ago
- spanlp: nlp applied for spanish vulgarity. A fast, robust Python library to check for profanity or offensive language in Spanish strings.…☆39Jun 15, 2024Updated last year
- ☆29Nov 8, 2021Updated 4 years ago
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆38Feb 23, 2026Updated last week
- Answers to Programming in C (Fourth Edition) by Stephan G. Kochan.☆49Feb 5, 2021Updated 5 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated 3 weeks ago
- Source Code for 'Software Architecture By Example' by Paul Michaels☆53Jan 16, 2024Updated 2 years ago
- This repo contains PoCs for vulnerable Windows drivers.☆130Dec 20, 2025Updated 2 months ago