Static code search python lib
☆18Oct 27, 2020Updated 5 years ago
Alternatives and similar repositories for glorifiedgrep
Users that are interested in glorifiedgrep are comparing it to the libraries listed below
Sorting:
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Feb 4, 2026Updated last month
- Telco training☆26Oct 17, 2018Updated 7 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- ☆10Sep 10, 2025Updated 5 months ago
- Examples for the HEBI Robotics Python API☆14Jan 9, 2026Updated last month
- A small utility to generate a word security report by using a knowledge base(XLSX).☆12Nov 25, 2023Updated 2 years ago
- gcnano-binaries☆11Feb 9, 2026Updated 3 weeks ago
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- ☆10May 8, 2018Updated 7 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- Artificial Dog to bark at deer and other garden pests using Raspberry Pi and Groundlight☆12Jun 19, 2024Updated last year
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- USB library for ChipWhisperer devices☆15Jan 22, 2026Updated last month
- The SPARX family of lightweight block ciphers☆11Jun 29, 2018Updated 7 years ago
- Those are my challenges for multiple CTF!☆10Mar 17, 2024Updated last year
- Google Workspace password sprayer with anti-captcha☆14Updated this week
- A python code for HART-IP Specification☆12Aug 18, 2016Updated 9 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- GOST-34.11-2012 (Stribog) hash-function☆11May 12, 2015Updated 10 years ago
- Popular with WEP/Used in DC Darknet badge -- simple implementations that will ultimately be used in attacking the badge.☆14Sep 22, 2015Updated 10 years ago
- Library for detecting tracking data transmissions from web or app traffic in HAR format.☆11Oct 22, 2025Updated 4 months ago
- Uber Eats for Home Assistant☆11Jan 20, 2026Updated last month
- Python library for MIME type parsing, normalisation and grouping.☆13Nov 13, 2024Updated last year
- ☆10Dec 24, 2022Updated 3 years ago
- Clone an Android Virtual Device for easy distribution through the Android SDK Manager.☆16Jul 9, 2012Updated 13 years ago
- ☆11Jun 2, 2015Updated 10 years ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- Intruder.py - A powerful tool to customize attacks on websites. Has 4 different options of attacks☆12Dec 1, 2020Updated 5 years ago
- libflutter.so(s) modified for traffic intercepting removing certificate pinning validation. Dart version is 2.10.5☆12Jul 11, 2021Updated 4 years ago
- ☆11Jun 22, 2020Updated 5 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆10Feb 13, 2017Updated 9 years ago
- CSV fuzzer/anonymizer☆10Feb 14, 2026Updated 2 weeks ago
- Odoo 12.0 allows remote attackers to read local files.☆11Jun 11, 2020Updated 5 years ago