☆114Jun 8, 2023Updated 2 years ago
Alternatives and similar repositories for cq
Users that are interested in cq are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆114Jun 8, 2023Updated 2 years ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆278Sep 11, 2025Updated 8 months ago
- Windows x64 kernel mode rootkit process hollowing POC.☆193Jun 30, 2023Updated 2 years ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆104Jul 22, 2025Updated 10 months ago
- An nmap script to produce target lists for use with various tools.☆33May 13, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Framework for generating audit commands for Unix security audits☆66Aug 1, 2023Updated 2 years ago
- ☆191Mar 2, 2026Updated 2 months ago
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆142May 3, 2026Updated 2 weeks ago
- WStalker: an easy proxy☆25May 5, 2020Updated 6 years ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Sep 27, 2023Updated 2 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- nodecraw allows you to perform web crawling on specified URLs. It utilizes various modules and libraries to crawl web pages, extract info…☆12Aug 25, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Repository of Microsoft Driver Block Lists based off of OS-builds☆46Apr 14, 2024Updated 2 years ago
- ☆105Jan 3, 2023Updated 3 years ago
- Go语言爆破Sha256前四字符☆10May 21, 2019Updated 7 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 6 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆35Feb 1, 2017Updated 9 years ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆52Mar 3, 2025Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆230Apr 17, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆20Dec 29, 2024Updated last year
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Mar 11, 2020Updated 6 years ago
- A in-the-wild V8 type confusion bug.☆30Aug 8, 2025Updated 9 months ago
- A simple remote scanner for Liferay Portal☆21Apr 6, 2025Updated last year
- Secure Terminal CTF Challenge for DC31 Red Team Village☆19Aug 22, 2023Updated 2 years ago
- CQ, a code security scanner☆99Feb 23, 2026Updated 2 months ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Jan 28, 2021Updated 5 years ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- THC "R U There" network discovery tool☆30May 1, 2020Updated 6 years ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- To audit the security of read-only domain controllers☆119Nov 27, 2023Updated 2 years ago
- Small POC for process ghosting☆40Feb 1, 2022Updated 4 years ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆133Nov 10, 2023Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆38Jun 15, 2023Updated 2 years ago
- Impacket☆50Feb 25, 2026Updated 2 months ago