DICOM secuirty
☆20Jul 18, 2020Updated 5 years ago
Alternatives and similar repositories for dicom
Users that are interested in dicom are comparing it to the libraries listed below
Sorting:
- All about subdomain enumeration☆16Feb 5, 2019Updated 7 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 4 months ago
- 一款支持检测web应用程序未授权访问缺陷的burp suite插件,可自定义配置检测字段以及返回包json数据分析☆12Apr 22, 2024Updated last year
- ☆11Aug 25, 2018Updated 7 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- Tools to work with the pwnedkeys.com API☆10Dec 20, 2018Updated 7 years ago
- OSCP guide and Red Team assessment Guide☆37Jul 9, 2020Updated 5 years ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- Coleção de informações sobre POS's disponíveis no mercado Brasileiro, com propósito educativo.☆11Sep 6, 2020Updated 5 years ago
- A PowerShell module that uses the WIN_API to access the registry☆14Apr 13, 2017Updated 8 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Convert ARIN Whois bulk data to computer parsable routing data☆10Jan 2, 2018Updated 8 years ago
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Scanner for misconfigured DevSecOps or Security tools on internet like SonarQube, GoPhish etc.☆12Apr 4, 2025Updated 11 months ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- AutoIt Obfuscator (Python module) lets you protect AutoIt script source code against analysis, reverse engineering, and decompilation usi…☆12Nov 27, 2025Updated 3 months ago
- Lightweight reflection scanner☆20Aug 31, 2025Updated 6 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- ☆12May 6, 2019Updated 6 years ago
- A United States map CTFd theme☆12Aug 28, 2017Updated 8 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 weeks ago
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 6 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆14May 5, 2025Updated 10 months ago
- ☆16Jan 23, 2026Updated last month
- ☆10Apr 8, 2018Updated 7 years ago
- Let Unifi Guests check voucher data bundle left☆10Nov 13, 2017Updated 8 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 4 months ago
- Apache datasketches☆17Jun 9, 2025Updated 9 months ago
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 3 years ago
- Yara intergrated into BurpSuite☆48Jun 30, 2016Updated 9 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆48Sep 4, 2018Updated 7 years ago
- Fuzz 403/401ing endpoints for bypasses☆10Aug 14, 2020Updated 5 years ago
- ☆12Apr 21, 2020Updated 5 years ago