A command-line application to generate random user agent strings.
β17Mar 20, 2020Updated 6 years ago
Alternatives and similar repositories for randomua
Users that are interested in randomua are comparing it to the libraries listed below
Sorting:
- π A command-line application to help determine the location information from a given ip address or url.β21Mar 29, 2017Updated 8 years ago
- Random HTTP User-Agent string generatorβ11Oct 22, 2014Updated 11 years ago
- BASH + VIM = Cryptolockerβ11Jul 31, 2018Updated 7 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.β13Feb 3, 2018Updated 8 years ago
- β12Jun 16, 2021Updated 4 years ago
- π¦ A friendly Ruby API to iptables.β15May 6, 2017Updated 8 years ago
- π» Tools for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.β32Jul 15, 2017Updated 8 years ago
- Remove Offensive and Profane Words from Wordlistsβ15Jul 27, 2023Updated 2 years ago
- VBScript minifierβ25Updated this week
- β13Apr 8, 2021Updated 4 years ago
- Tools about security.txt for Rubyβ20Oct 14, 2023Updated 2 years ago
- get the http allowed methods for URLs listβ13Feb 22, 2021Updated 5 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.β17Dec 12, 2023Updated 2 years ago
- π Intrusion Detection Systemβ17Jan 10, 2023Updated 3 years ago
- Tests for SSRF by injecting a specified location into different headers. This is a Rust port of m4ll0k's tool.β37Jul 7, 2020Updated 5 years ago
- A PHP wrapper template to execute PowerShell payloadsβ11Apr 2, 2021Updated 4 years ago
- Obtain a clean-cut architecture at the launch of a mission and run some tests ( subdomain search, fuzzing, make screenshots on a given peβ¦β25Jul 18, 2023Updated 2 years ago
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon mβ¦β11May 31, 2020Updated 5 years ago
- iOS dylib build support in Xcodeβ22Nov 7, 2011Updated 14 years ago
- An example of COM hijacking using a proxy DLL.β44Aug 17, 2021Updated 4 years ago
- Impersonate Tokens using only NTAPI functionsβ84Apr 4, 2025Updated 11 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it uselessβ39Jul 12, 2024Updated last year
- Bug Bounty Program Discovery tool, that discovers bug Bounty Program via security.txt file by default and you can use custom dorkβ16Jul 17, 2022Updated 3 years ago
- Lecture on SIMD unitsβ11Feb 28, 2017Updated 9 years ago
- CUDA GPU implementation of GMRES iterative Solverβ10Apr 16, 2012Updated 13 years ago
- β44Jul 23, 2021Updated 4 years ago
- multiple password 'asher using Pythonβs hashlibβ15Mar 24, 2021Updated 4 years ago
- a shared short domain for XSS and other hacksβ32Mar 3, 2022Updated 4 years ago
- A simple program to query nmap xml files in the terminal.β27May 4, 2020Updated 5 years ago
- CGI is a large class, providing several categories of methods, many of which are mixed in from other modules.β41Mar 16, 2026Updated last week
- Code and files for the Arduino DIY Satellite project (Cubesat)β42Feb 27, 2020Updated 6 years ago
- β12Feb 9, 2023Updated 3 years ago
- Very basic OpenCASCADE examples that compile with g++ and dont need qt installed.β12Sep 8, 2017Updated 8 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.β28Mar 1, 2026Updated 3 weeks ago
- DefCon Red Team Village 2023 Workshop on DLL Sideloadingβ19Aug 15, 2023Updated 2 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "reaβ¦β22Apr 22, 2024Updated last year
- A PoC .NET-specific process injection toolβ58Mar 17, 2024Updated 2 years ago
- Discover, setup, and get stats on network interfacesβ11Nov 17, 2023Updated 2 years ago
- My solutions to problems in the 'UVA toolkit'.β12Jul 18, 2011Updated 14 years ago