A collection of personal ZAP scripts
☆13Apr 10, 2023Updated 2 years ago
Alternatives and similar repositories for zaproxy-scripts
Users that are interested in zaproxy-scripts are comparing it to the libraries listed below
Sorting:
- SonicWall VPN-SSL Exploit* using Golang ( * and other targets vulnerable to shellshock ).☆18Feb 11, 2021Updated 5 years ago
- ☆13Feb 29, 2020Updated 6 years ago
- A curated collection of some cool Penetration scripts.☆14Feb 25, 2021Updated 5 years ago
- A collection of tools to work on username:password combo lists☆14Oct 28, 2022Updated 3 years ago
- Organizar documentos sobre OSINT feitos em pt-br☆21Dec 20, 2023Updated 2 years ago
- A continuously curated list of my favorite links and resources relating to Open Source Intelligence gathering.☆18Jul 10, 2018Updated 7 years ago
- OSINT Brazuca Posters é um repositório criado com intuito de organizar posters autorais dentro do projeto OSINT Brazuca.☆14Dec 13, 2023Updated 2 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- With SteamReveal, you can enter the URL of a Steam profile and discover the player's best friends and possible location.☆22Feb 23, 2026Updated 3 weeks ago
- Webcam virtual backgrounds with Rust, Tensorflow & RobustVideoMatting☆11Sep 26, 2023Updated 2 years ago
- Reverse HTTP shell with basic ARC4 encryption support☆12Dec 28, 2015Updated 10 years ago
- Comprehensive guide to AI applications in OSINT workflows and intelligence analysis☆49Jul 14, 2025Updated 8 months ago
- c++ implementation of a simple-virtual-machine☆14Sep 19, 2014Updated 11 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- A simple script to scrape a list of accounts or single account from Twitter into a neatly formatted Excel file.☆18Jan 25, 2023Updated 3 years ago
- ☆21Mar 9, 2021Updated 5 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- A program for backup & restoration of btrfs subvolumes.☆12Feb 27, 2026Updated 3 weeks ago
- Principles of MITRE ATT&CK in the fraud domain☆35Apr 14, 2019Updated 6 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 4 months ago
- An anti DDoS tool that tries to neutralize proxies denial of service. Created in 2016.☆10Oct 2, 2016Updated 9 years ago
- Safe Qubes OS screenshot tool with active VM detection & window border removal features☆15Nov 28, 2024Updated last year
- Super IOCTL Basic Fuzzer☆16Sep 22, 2019Updated 6 years ago
- ☆12Aug 23, 2019Updated 6 years ago
- Error Level Analysis (ELA) in ImageJ☆10Oct 17, 2019Updated 6 years ago
- Tool to display a Windows 8+ process mitigation policy☆12Jul 9, 2025Updated 8 months ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆25May 5, 2017Updated 8 years ago
- Leverage the power of the Google Natural Language API NLP to retrieve entity relationships from Wikipedia URLs or topics! Get interactive…☆15Jun 23, 2021Updated 4 years ago
- Repo for this AWS Blogpost☆14Updated this week
- Sample cross-platform Web Application Firewall, used as a security proxy for existing web apps☆15Oct 16, 2017Updated 8 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆32Aug 6, 2019Updated 6 years ago
- ☆15Nov 12, 2015Updated 10 years ago
- Paper Collection☆23Jan 22, 2018Updated 8 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Stanford CoreNLP NER addon for Apache Tika's NamerEntityParser☆13Feb 26, 2022Updated 4 years ago
- Indispensable helpers for common test cases in web apps. Find out if all other things are equal.☆17Oct 14, 2015Updated 10 years ago