python 2 arp poisonner
☆15Sep 30, 2022Updated 3 years ago
Alternatives and similar repositories for larp
Users that are interested in larp are comparing it to the libraries listed below
Sorting:
- AWS security scanning checks in a container☆13Apr 11, 2016Updated 9 years ago
- Reverse shell for remote administration☆29Feb 12, 2018Updated 8 years ago
- Simple (web-) application vulnerability management system☆21Aug 14, 2014Updated 11 years ago
- A cross site scripting command and control notification server☆23Mar 24, 2024Updated last year
- 504 VSAgent☆25Feb 21, 2018Updated 8 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- On demand Build Agents for Azure DevOps☆10Aug 31, 2020Updated 5 years ago
- A collection of Claude commands and utilities☆25Updated this week
- ☆10Jun 11, 2019Updated 6 years ago
- ☆11Jul 10, 2019Updated 6 years ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- ☆13Oct 21, 2025Updated 4 months ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Default locations for files on various Linux distros.☆10May 12, 2021Updated 4 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- Hacker script to automate cv sending process when you're on the job hunt mission!☆11Jan 2, 2018Updated 8 years ago
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 7 years ago
- A list of backdoor samples I find online.☆13Dec 16, 2019Updated 6 years ago
- Proof of concept that uses cosign and GitHub's in built OIDC for actions to sign container images, providing a proof that what is in the …☆14Jan 31, 2023Updated 3 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- A basic Calculator with five functions for addition, subtraction, division, multiplication and modulo operation☆11Dec 8, 2022Updated 3 years ago
- kubectl plugin to dump example helper resource templates☆13Feb 20, 2023Updated 3 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- DNS Amplification IPTABLES block lists and Rules against DNS Attacks☆11Oct 25, 2016Updated 9 years ago
- ☆10Jan 31, 2024Updated 2 years ago
- Automate Lynis Fixes☆10Jan 8, 2018Updated 8 years ago
- A small script to import and ban IPs from a list (like from blocklist.de)☆14Oct 23, 2016Updated 9 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- Simple k8s watcher to copy a file into a configmap☆11Aug 5, 2023Updated 2 years ago
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 5 years ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- Personal fork of Kippo SSH honeypot.☆13May 25, 2014Updated 11 years ago
- This talk will invite you to follow along while we discuss the steps in what it takes to get started with your image factory by utilizing…☆11May 18, 2023Updated 2 years ago