Secure, ephemeral browsing in a disposable VM (macOS only)
☆209Apr 3, 2026Updated this week
Alternatives and similar repositories for bromure
Users that are interested in bromure are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- router firmwares, reverse engineering code snippets, mitm tools☆14Mar 20, 2020Updated 6 years ago
- Provides a consistent API around some existing scanning tools to integrate them with the rest of the tool kit☆19Mar 30, 2026Updated last week
- Scripts and payloads for internet-wide network scanning☆17Aug 2, 2015Updated 10 years ago
- Progzee is a Python library for simplifying IP proxy usage in HTTP requests.☆16Feb 28, 2025Updated last year
- ☆11Dec 19, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A simple web viewer for TruffleHog JSON output.☆19Jan 7, 2026Updated 3 months ago
- 💸 Vim money color scheme☆10Sep 26, 2017Updated 8 years ago
- ☆10Jun 14, 2016Updated 9 years ago
- ADT support for Flink with Shapeless☆12Jan 11, 2020Updated 6 years ago
- Summit Route End Point Protection - Client code☆16Apr 10, 2016Updated 9 years ago
- Cython library for Wireguard☆18Jan 12, 2026Updated 2 months ago
- OAuth 2.0 exploitation, attack and research tools.☆13Jan 20, 2024Updated 2 years ago
- ☆20Aug 17, 2015Updated 10 years ago
- pentestMCP: AI-Powered Penetration Testing via MCP, an MCP designed for penetration testers.☆55Mar 21, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆60Feb 23, 2026Updated last month
- Repo containing my public talks☆23May 30, 2023Updated 2 years ago
- USB man in the middle linux kernel driver☆21May 3, 2021Updated 4 years ago
- Some maven and java code examples.☆11Mar 11, 2011Updated 15 years ago
- ☆13Jun 30, 2019Updated 6 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- YAML data sources for metasploit.github.io☆20Apr 12, 2016Updated 9 years ago
- Take domains on stdin and output them on stdout if they get resolved☆32May 27, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆27May 20, 2025Updated 10 months ago
- Partitioned Counter Based on Riak Core☆18Oct 19, 2011Updated 14 years ago
- ☆22Jan 9, 2019Updated 7 years ago
- Left To My Own Devices - NT hash tools☆40Aug 4, 2022Updated 3 years ago
- Some scripts to support with importing large datasets into BloodHound☆81Nov 28, 2023Updated 2 years ago
- Aho Corasick Multiple String search algorithm, based on Danny Yoo's implementation.☆23Feb 1, 2011Updated 15 years ago
- Quick deployment of auto-deploy tools☆17Oct 11, 2025Updated 5 months ago
- This project allows to run Samza jobs on Mesos cluster☆13Jan 8, 2017Updated 9 years ago
- A curated list of awesome infosec resources.☆32May 31, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Scripts and things.☆13Jan 23, 2026Updated 2 months ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- eBPF-For-Windows extension to provide access to Windows kernel functionality☆41Mar 31, 2026Updated last week
- Fastest word count in Java☆17May 31, 2016Updated 9 years ago
- ☆16May 20, 2022Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆13Dec 20, 2019Updated 6 years ago