☆19Mar 3, 2022Updated 4 years ago
Alternatives and similar repositories for ContiLeaks
Users that are interested in ContiLeaks are comparing it to the libraries listed below
Sorting:
- simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose☆17Feb 24, 2023Updated 3 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- A GitHub Action to convert the Kali Linux Generic Cloud Image and upload it to Custom Images in DigitalOcean.☆15Apr 26, 2025Updated 10 months ago
- OWASP Foundation web repository☆16Oct 11, 2025Updated 4 months ago
- ☆10Nov 15, 2020Updated 5 years ago
- TeamViewer QuickSupport Integration for .net applications☆11Jan 20, 2022Updated 4 years ago
- A super handy base model for use in Codeigniter projects☆12Jul 25, 2013Updated 12 years ago
- Burp Suite extension designed to help security professionals search for custom sensitive information in HTTP responses☆11Apr 25, 2023Updated 2 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 7 months ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- FAQ with instructions for common queries asked by general public☆12Sep 8, 2025Updated 6 months ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- perl, non-alphanumeric, php☆10Mar 16, 2017Updated 8 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Notes about running Linux natively on the Google Pixel (completely getting rid of ChromeOS).☆20Sep 18, 2013Updated 12 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Dec 12, 2022Updated 3 years ago
- An unofficial Python wrapper for the SBB API.☆12Aug 22, 2019Updated 6 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- A simple podcaster Zoom App to demonstrate Immersive Mode through our Layers API☆16Nov 14, 2023Updated 2 years ago
- Publish and subscribe to markers on a Google Map with real-time updating.☆15Dec 19, 2018Updated 7 years ago
- Package repositories for linux-surface☆11Updated this week
- lightmon is a lightweight, Docker/K8s container-aware network traffic monitoring tool based on eBPF technology.☆15May 15, 2025Updated 9 months ago
- Security Token (WIP)☆11Oct 2, 2018Updated 7 years ago
- OS Lockdown☆13Nov 21, 2017Updated 8 years ago
- Filigraneur - Filigrane Facile & Sécurisé☆13Aug 17, 2025Updated 6 months ago
- Ambient display using M5Paper that display data from a http endpoint☆12Jan 26, 2022Updated 4 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- Some vulnerability research slides that I made☆12Jan 5, 2022Updated 4 years ago
- A high-performance network packet capture library☆14Nov 16, 2025Updated 3 months ago
- Decompile .Net code in Powershell☆13Sep 21, 2015Updated 10 years ago
- ☆11Dec 26, 2022Updated 3 years ago
- Back-end server (API) of waarzitje.nu.☆13Mar 2, 2026Updated last week
- A node.js server used to compile Latex files and send back the resulting pdf or log in case of error.☆13Apr 7, 2016Updated 9 years ago