samyk / drawioLinks
Source to www.draw.io
☆99Updated 6 years ago
Alternatives and similar repositories for drawio
Users that are interested in drawio are comparing it to the libraries listed below
Sorting:
- A Passive SSH back-end and scanner.☆102Updated this week
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆85Updated 4 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 6 years ago
- ☆22Updated 7 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆109Updated 5 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- Binary Protocol Differ☆119Updated 4 years ago
- Let's brute force this hotel's tv.☆78Updated 5 years ago
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆63Updated 4 years ago
- ☆37Updated 3 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆43Updated 4 years ago
- Create automated tasks and keep an eye on interesting things!☆81Updated 4 months ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆77Updated 4 years ago
- A Go client for crobat☆24Updated 5 years ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆106Updated 9 months ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- egrets monitors egress☆46Updated 5 years ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆35Updated 2 years ago
- A host monitoring proof of concept that uses python and ebpf to watch for bad behavior and optionally take action on it.☆12Updated 5 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆69Updated last month
- edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of …☆51Updated 6 months ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆243Updated 2 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Automate "airgapped" server proxy with ssh socks proxy☆101Updated 3 years ago
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆71Updated 2 years ago
- Writing a container in a few lines of Go code, as seen at DockerCon 2017 and on O'Reilly Safari☆40Updated 4 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Just for funsies, virtual foregrounds in Zoom conference calls☆18Updated 5 years ago