Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.
☆37Jun 11, 2016Updated 9 years ago
Alternatives and similar repositories for LAMMA-beta
Users that are interested in LAMMA-beta are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Dec 13, 2016Updated 9 years ago
- Extract Sense out of Gibberish stuff☆81May 11, 2017Updated 8 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Alpha version code of Recon UI☆15Feb 26, 2018Updated 8 years ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- A sub-domain reconnaissance written in golang☆12Jan 11, 2018Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- IPv6 Excuses☆10Sep 11, 2018Updated 7 years ago
- ☆25Jan 18, 2015Updated 11 years ago
- ☆11Aug 2, 2016Updated 9 years ago
- Tired of paying a subscription service to access an API to resolve geoIP data? Look no further! Resolving locally and maintaining your ow…☆15Jan 15, 2025Updated last year
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Network component: manipulate IP addresses (ipv4, ipv6) in PHP used in the Matomo project☆21Oct 10, 2025Updated 5 months ago
- Slides of 44Con 2018☆23Oct 11, 2018Updated 7 years ago
- ☆12Jun 28, 2017Updated 8 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- Burp extension for processing requests and responses with Python.☆10Jun 19, 2018Updated 7 years ago
- ~ BannerGrab☆25Oct 28, 2016Updated 9 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Turn your recursive DNS (BIND) server into a network investigation enabler with DnsTap and RPZ. Make PTR recs great again!☆14Sep 5, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- This is a concept poc of command and control server implemented over blockchain☆56Aug 13, 2019Updated 6 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- scan-detection policies for bro☆16Jan 16, 2025Updated last year
- Python MaxMind DB writer☆14Apr 3, 2019Updated 6 years ago
- unbox - Unpack and Decompile the $h*! out of things☆48Mar 28, 2018Updated 8 years ago
- Use Frida DBI to instrument binary and perform basic-block code coverage that is fed back to AFL.☆12Nov 23, 2019Updated 6 years ago
- A Platform for Testing Secure Coding/Config☆19Nov 13, 2018Updated 7 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Binary Ninja Plugin for Generating Callgraphs☆17Jun 17, 2025Updated 9 months ago
- ☆26Sep 20, 2019Updated 6 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- Import Bro logs from SecurityOnion into Logstash☆15Nov 10, 2015Updated 10 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13May 8, 2018Updated 7 years ago
- All tools you needed during penetration testing.☆18Mar 26, 2017Updated 9 years ago
- Hardening Tool for *nixes☆50Apr 22, 2017Updated 8 years ago