python 2 arp poisonner
☆15Sep 30, 2022Updated 3 years ago
Alternatives and similar repositories for larp
Users that are interested in larp are comparing it to the libraries listed below
Sorting:
- AWS security scanning checks in a container☆13Apr 11, 2016Updated 9 years ago
- Simple (web-) application vulnerability management system☆21Aug 14, 2014Updated 11 years ago
- A cross site scripting command and control notification server☆23Mar 24, 2024Updated last year
- ☆10Aug 4, 2020Updated 5 years ago
- ☆11Jul 10, 2024Updated last year
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Useful scripts that I create in my free time to benefit the open source community.☆12Dec 14, 2019Updated 6 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- ☆11Jul 10, 2019Updated 6 years ago
- This talk will invite you to follow along while we discuss the steps in what it takes to get started with your image factory by utilizing…☆11May 18, 2023Updated 2 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- ☆11Dec 22, 2022Updated 3 years ago
- Simple k8s watcher to copy a file into a configmap☆11Aug 5, 2023Updated 2 years ago
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 5 years ago
- A list of backdoor samples I find online.☆13Dec 16, 2019Updated 6 years ago
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆11Sep 20, 2019Updated 6 years ago
- Proof of concept that uses cosign and GitHub's in built OIDC for actions to sign container images, providing a proof that what is in the …☆14Jan 31, 2023Updated 3 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- ☆12Sep 18, 2015Updated 10 years ago
- A minimal Apache Hive server in a Docker image☆13Dec 24, 2020Updated 5 years ago
- Personal fork of Kippo SSH honeypot.☆13May 25, 2014Updated 11 years ago
- kubectl plugin to dump example helper resource templates☆13Feb 20, 2023Updated 3 years ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- NVD API 2.0 for python☆12Sep 26, 2024Updated last year
- A small script to import and ban IPs from a list (like from blocklist.de)☆14Oct 23, 2016Updated 9 years ago
- Rsources that are publicly available, these resources are linked to the SANS SEC598 Class☆21Feb 2, 2026Updated last month
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 7 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- This project is a Kubernetes Engine project developed with RKE2 for Openstack☆24Feb 19, 2026Updated 2 weeks ago
- a script for Kali Linux☆10Jun 28, 2013Updated 12 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Flux Subsystem for Argo - Patch Repository☆13Mar 29, 2024Updated last year
- Splunk Light with Docker Dashboards☆11Oct 12, 2017Updated 8 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- A CommonJS library for working with Common Vulnerability Scoring System vectors and scores.☆12Jul 14, 2022Updated 3 years ago