☆29Oct 8, 2019Updated 6 years ago
Alternatives and similar repositories for slimshim
Users that are interested in slimshim are comparing it to the libraries listed below
Sorting:
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Feb 11, 2018Updated 8 years ago
- Some of my Nmap scripts☆22Aug 3, 2017Updated 8 years ago
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆20Jun 29, 2016Updated 9 years ago
- Framework for building transparent memory encryption and authentication solutions☆27Jun 19, 2018Updated 7 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- Python object interface to requests/responses recorded by Burp Suite☆37Jan 21, 2020Updated 6 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Zero knowledge push relay☆33Aug 26, 2019Updated 6 years ago
- ☆12Mar 7, 2022Updated 4 years ago
- Mass DNS resolution tool☆37Jan 1, 2026Updated 2 months ago
- Music GAN - GANSynth preprocessing, ProGAN and DCGAN architecture☆11Jan 26, 2023Updated 3 years ago
- Searches for interesting cached DNS entries.☆55May 15, 2014Updated 11 years ago
- Data projects in relation to psychedelics therapeutic research☆11Feb 17, 2023Updated 3 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- DNS Enumeration and Reconnaissance Tool☆36Jan 19, 2016Updated 10 years ago
- Wifi Automated Fake HotSpot Hijacking with aicrack-ng, airbase, ssl-strip, and dns spoof in Python.☆42Jun 6, 2014Updated 11 years ago
- A collection of audio plugins compliled for RBPi, ready to use with Zynthian->Carla☆38Sep 21, 2016Updated 9 years ago
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆10Nov 30, 2018Updated 7 years ago
- RPM Signal Generator V2.0☆10Oct 17, 2017Updated 8 years ago
- building a pet ID scanner☆11Nov 1, 2021Updated 4 years ago
- Gojira is a record and replay framework for Java apps meant for regression testing. It provides complete recording capability within a si…☆13Feb 5, 2025Updated last year
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- The knife of the Admin & Security auditor☆42Feb 12, 2020Updated 6 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Mar 7, 2023Updated 3 years ago
- Files compiled from the Logica breach investigation materials☆45Aug 14, 2018Updated 7 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Jun 30, 2015Updated 10 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆500Aug 11, 2017Updated 8 years ago
- A command-line tool that provides the core functionality for storing and retrieving shell command history with directory context in SQLit…☆10Feb 6, 2026Updated last month
- A fourier-based audio-synthesiser wrote in MATLAB as a university project.☆12Jan 19, 2019Updated 7 years ago
- Deduplication of yara rules☆10Sep 18, 2017Updated 8 years ago
- 🧠 A field guide to mnemonics for engineers: outages, RCAs, infra design, burnout, and conflict. Structured entries with when-to-use, pit…☆16Feb 1, 2026Updated last month
- Udev helper for naming devices per BIOS names☆19Sep 21, 2023Updated 2 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Updated of Tombola's modular euclidean sequencer☆11May 21, 2017Updated 8 years ago
- This is the code for the second prototype of a robotic aquaponic ecosystem we build.☆10Apr 26, 2014Updated 11 years ago
- Running TaintDroid from the command line and analyze output☆17Mar 28, 2012Updated 13 years ago