☆23Sep 7, 2023Updated 2 years ago
Alternatives and similar repositories for ssc-asi-tools
Users that are interested in ssc-asi-tools are comparing it to the libraries listed below
Sorting:
- Technical Notes☆16Dec 1, 2017Updated 8 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- I leverage OpenAI and ChatGPT to do hackerish things☆1,177Jul 21, 2025Updated 8 months ago
- .Net Assembly loader for the GMSAPasswordReader☆19Feb 15, 2023Updated 3 years ago
- A collection of prompts for people that want to learn more about cybersecurity topics.☆16Mar 31, 2023Updated 2 years ago
- PoC of 'LeakySAB' a vulnerability allowing extraction of usenet provider password from a SABnzbd instance☆12Apr 22, 2024Updated last year
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona…☆18Oct 16, 2024Updated last year
- Pull Hashes Decryption From Online Sources Using Python☆16Jun 25, 2024Updated last year
- A powershell script for creating a Windows honeyport.☆12Jun 24, 2015Updated 10 years ago
- Checker de Spotify en la terminal [TERMUX]☆20Feb 26, 2023Updated 3 years ago
- ☆27Mar 5, 2023Updated 3 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Mar 2, 2022Updated 4 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated last year
- ☆20Apr 5, 2023Updated 2 years ago
- ☆18Dec 6, 2022Updated 3 years ago
- A python based tool for finding SQL vulnerable sites.☆14May 22, 2023Updated 2 years ago
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆267Mar 26, 2023Updated 2 years ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆35Updated this week
- ☆14Updated this week
- Distributed game of life (inspired by Torben Hoffman's solution found at https://github.com/lehoff/egol)☆11Aug 13, 2015Updated 10 years ago
- NeMo: a toolkit for conversational AI☆12Dec 23, 2022Updated 3 years ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- Python bindings for Yeti's API☆19Sep 12, 2023Updated 2 years ago
- ☆15Mar 29, 2024Updated last year
- Script to simulates a phishing attack by making concurrent HTTP requests to phishing links (Dana Kaget)☆15Dec 27, 2023Updated 2 years ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Jul 26, 2024Updated last year
- Content for the supergraph.io website☆17Jun 18, 2024Updated last year
- ☆33May 19, 2024Updated last year
- GPU and CPU ZEC miners for OS X☆17Jan 15, 2017Updated 9 years ago
- Build an SSL capable transparent proxying WiFi Access point with budget commodity hardware and Open Source software.☆15Mar 1, 2013Updated 13 years ago
- Collect all vulns in http://testphp.vulnweb.com/☆24Aug 20, 2022Updated 3 years ago
- promptflowx is a simple and powerful tool for building prompt-driven workflows.☆14Jul 31, 2024Updated last year
- ☆19Nov 27, 2020Updated 5 years ago
- XSS-Freak is an xss scanner fully written in python3 from scratch. it is one of its kind since it crawls the website for all possible lin…☆26Feb 15, 2020Updated 6 years ago
- Get airport arrivals, departures, details and METAR weather info from CLI☆24Jan 21, 2022Updated 4 years ago
- Abusing Maybank's unauthenticated APIs for real time market data☆15Aug 12, 2024Updated last year
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- Golang bindings for PE-sieve☆42Nov 11, 2023Updated 2 years ago