☆33Jan 16, 2026Updated last month
Alternatives and similar repositories for genai-essentials
Users that are interested in genai-essentials are comparing it to the libraries listed below
Sorting:
- OAuth 2.0 Dynamic Security Scanner☆33Feb 27, 2021Updated 5 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Secure access cloud terraform provider☆13Feb 24, 2026Updated last week
- Notes some analysis related to VidarStealer sample☆16May 5, 2024Updated last year
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆10Nov 24, 2015Updated 10 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 5 months ago
- A tool to convert smali codes to java-like codes☆23May 6, 2015Updated 10 years ago
- Compiled executables of common crypto and encoding algorithms☆16Oct 3, 2023Updated 2 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Feb 25, 2026Updated last week
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated 11 months ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Terraform provider for command execution☆12Mar 16, 2020Updated 5 years ago
- De Bruijn Sequence WAV File Generator for the HackRF☆14Jan 11, 2023Updated 3 years ago
- ☆12Mar 14, 2022Updated 3 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 10 months ago
- ☆10Jul 6, 2016Updated 9 years ago
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 4 months ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- buddycloud static site generation and gh_pages☆18Sep 8, 2016Updated 9 years ago
- syscall hijacking in 2019☆13Feb 25, 2019Updated 7 years ago
- Contains function and feature extensions, code examples, and utilities for JumpCloud, including automated user import, CSV import, and ot…☆14Mar 8, 2016Updated 9 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- Trigger-only for CVE-2021-29627☆13Apr 12, 2021Updated 4 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 10 months ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- ☆15May 23, 2019Updated 6 years ago
- Writeups of CTF challenges I do☆13Sep 29, 2019Updated 6 years ago
- SQL injection detection engine by tokenzing and syntax analysis, like SQLChop☆10May 8, 2017Updated 8 years ago
- ***MERGED: SEE README:*** The XCCDF to InSpec parser scans and extracts the controls defined in the DISA XCCDF STIG XML documents and con…☆12Nov 23, 2018Updated 7 years ago
- Using OpenCV and MatLab for edge detection in the Lab colorspace☆12Feb 20, 2015Updated 11 years ago
- A set of bash scripts for offensive security pentesting. (Machine with Kali reccomended)☆13Sep 30, 2016Updated 9 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- WIP: A set of policies based on Catalyze.io's open sourced and vetted policies for HIPPA compliance.☆13Dec 26, 2014Updated 11 years ago