Proper sandboxing for agentic coding and web browsing
☆219Apr 28, 2026Updated this week
Alternatives and similar repositories for bromure
Users that are interested in bromure are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dast tool☆14Jul 28, 2023Updated 2 years ago
- Progzee is a Python library for simplifying IP proxy usage in HTTP requests.☆16Feb 28, 2025Updated last year
- Scripts and payloads for internet-wide network scanning☆17Aug 2, 2015Updated 10 years ago
- ☆11Dec 19, 2024Updated last year
- Darkbit Cloud Security Tools☆25Nov 12, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆10Jun 14, 2016Updated 9 years ago
- Integration between SIEMs and TAXII services☆10Mar 2, 2023Updated 3 years ago
- ADT support for Flink with Shapeless☆12Jan 11, 2020Updated 6 years ago
- Riak data as input to hadoop m/r and output of hadoop m/r☆32Jun 28, 2012Updated 13 years ago
- Summit Route End Point Protection - Client code☆16Apr 10, 2016Updated 10 years ago
- Visualize Microsoft Defender XDR process trees and security events☆33Aug 24, 2025Updated 8 months ago
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆61Feb 23, 2026Updated 2 months ago
- Repo containing my public talks☆23May 30, 2023Updated 2 years ago
- It's a quick HTTPS server.☆14Oct 7, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Summer internship project for Virginia Space. Created a data diode for one way communication!☆15Aug 10, 2017Updated 8 years ago
- pentestMCP: AI-Powered Penetration Testing via MCP, an MCP designed for penetration testers.☆58Mar 21, 2026Updated last month
- Some maven and java code examples.☆11Mar 11, 2011Updated 15 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- YAML data sources for metasploit.github.io☆20Apr 12, 2016Updated 10 years ago
- Partitioned Counter Based on Riak Core☆18Oct 19, 2011Updated 14 years ago
- Compilation of peHash implementations.☆15May 2, 2019Updated 6 years ago
- ☆22Jan 9, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Left To My Own Devices - NT hash tools☆40Aug 4, 2022Updated 3 years ago
- Trailhead Banner is a web application that allows users to generate LinkedIn banners using their Trailhead data.☆48Apr 19, 2026Updated last week
- Some scripts to support with importing large datasets into BloodHound☆82Nov 28, 2023Updated 2 years ago
- ☆13Jan 30, 2025Updated last year
- Aho Corasick Multiple String search algorithm, based on Danny Yoo's implementation.☆23Feb 1, 2011Updated 15 years ago
- ☆20Updated this week
- This project allows to run Samza jobs on Mesos cluster☆13Jan 8, 2017Updated 9 years ago
- System Call Integrity Layer - experimental security research☆26Apr 14, 2026Updated 2 weeks ago
- A curated list of awesome infosec resources.☆32May 31, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Scripts and things.☆13Jan 23, 2026Updated 3 months ago
- eBPF-For-Windows extension to provide access to Windows kernel functionality☆44Apr 18, 2026Updated last week
- Fastest word count in Java☆17May 31, 2016Updated 9 years ago
- ☆16May 20, 2022Updated 3 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago