☆48Dec 11, 2025Updated 2 months ago
Alternatives and similar repositories for dredge-cli
Users that are interested in dredge-cli are comparing it to the libraries listed below
Sorting:
- Automatically exported from code.google.com/p/pweb-suite☆14Jun 8, 2016Updated 9 years ago
- A simple scanner to find and brute force tomcat manager logins☆27Dec 11, 2019Updated 6 years ago
- E-Commerce Clothing Shop Website! This project is a dynamic and user-friendly online store created using WordPress, designed to offer a s…☆11Aug 10, 2024Updated last year
- Technical Tabletop Exercises Simulation Framework☆48Oct 30, 2023Updated 2 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- Yara station is a management portal for Neo23x0-Loki. The mission is to transform the standalone nature of the Loki scanner into a centra…☆35Feb 1, 2022Updated 4 years ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆55Feb 26, 2026Updated last week
- A python library for runtime validation and type checking of python values.☆10Aug 11, 2022Updated 3 years ago
- ☆83Nov 14, 2025Updated 3 months ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- ☆12Sep 10, 2022Updated 3 years ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- This script is designed to analyze network traffic captured in a .pcap file using the pyshark library. // Este script está diseñado para …☆10Feb 8, 2025Updated last year
- ☆11Jul 18, 2018Updated 7 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Mar 7, 2025Updated last year
- This repo contains the Dockerfiles to deploy a pivoting lab!☆47Nov 7, 2025Updated 3 months ago
- Data about all known supply-chain attacks through history☆63May 28, 2025Updated 9 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 10 months ago
- ☆10Apr 2, 2022Updated 3 years ago
- Dynamic_RDS - Plugin for Falcon Player (FPP) to manage an FM transmitter and custom RDS (radio data system) messages similar to what is s…☆13Updated this week
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- On Premise Installer☆14Apr 7, 2021Updated 4 years ago
- psPAS Example scripts & code☆11Jul 19, 2020Updated 5 years ago
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dir…☆15Jul 10, 2025Updated 7 months ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆27Jul 11, 2025Updated 7 months ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- CeramicSkate0 Sysmon configuration fork file template with default high-quality event tracing☆10Sep 29, 2023Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- ☆10Jan 22, 2025Updated last year
- Collection of all the PHPCS rulesets offered by the PHPCompatibility organisation.☆13Feb 5, 2026Updated last month
- ☆10Jul 3, 2021Updated 4 years ago