☆10Nov 30, 2020Updated 5 years ago
Alternatives and similar repositories for PII_Tools
Users that are interested in PII_Tools are comparing it to the libraries listed below
Sorting:
- FARO - Document Sensitivity Detector☆11Feb 8, 2021Updated 5 years ago
- Splunk TA for alert action to TheHive-project☆11May 13, 2020Updated 5 years ago
- collectd☆11Feb 3, 2020Updated 6 years ago
- pytesla is a python bindings for the Model S REST API - DEPRECATED☆26May 10, 2014Updated 11 years ago
- Windows Privilege Escalation Labs☆18May 10, 2021Updated 4 years ago
- ☆16Apr 11, 2017Updated 8 years ago
- Tracker blocking lists based on the DuckDuckGo Tracker Radar provided in the popular EasyList format and thus suitable for inclusion in e…☆13May 17, 2022Updated 3 years ago
- Adds an IP Address feed (CIDR) into Check Point Objects via a URL☆11May 22, 2020Updated 5 years ago
- File manager for Mezzanine☆43Jun 5, 2023Updated 2 years ago
- Spark 教學專用☆18Feb 28, 2018Updated 8 years ago
- 廢材四足機器人☆19Mar 13, 2017Updated 9 years ago
- easy python web crawler sharing☆19Jun 9, 2017Updated 8 years ago
- FNB 48 Firmware, Manual and Bluetooth App repo. The official link for the app is dead, so never know when the other will be dead. Mirror …☆15Mar 5, 2023Updated 3 years ago
- Sample of D3.js☆21Sep 20, 2019Updated 6 years ago
- Documentation for connecting Microsoft Sentinel and the ACSC CTIS platform☆10Jan 23, 2024Updated 2 years ago
- A python client library for interfacing with the autofocus rest services☆19Jun 18, 2021Updated 4 years ago
- 一些 Webpack 的簡單 demo☆29Nov 21, 2016Updated 9 years ago
- ☆22Apr 6, 2018Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- This repo represents work the Phantom Community collaborates on to build apps and learn.☆13May 18, 2021Updated 4 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆132Nov 7, 2024Updated last year
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- Mitigations (AWS WAF, Lambda@Edge/CloudFront Functions) to implement on AWS to attempt to prevent log4j exploitation.☆22Dec 19, 2021Updated 4 years ago
- Rogue Synergy server☆18Mar 8, 2017Updated 9 years ago
- This is a summary of many Docker setups.☆18Aug 17, 2025Updated 7 months ago
- ☆10Jan 22, 2016Updated 10 years ago
- ☆37May 13, 2020Updated 5 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Sample Docker Compose files for running Apache Ambari☆10Oct 29, 2018Updated 7 years ago
- Genrates python dependency graph☆22Aug 10, 2018Updated 7 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- Credentials recovery project☆11May 12, 2015Updated 10 years ago
- This repository contains the code snippets used in "LLM Prompt Engineering For Developers"☆12Apr 22, 2024Updated last year
- A library and tool for querying, executing and exporting TR-064 devices and services☆10Apr 4, 2018Updated 7 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- ☆22Feb 2, 2026Updated last month
- Buildkite plugin for working with AWS Secrets Manager☆50Feb 5, 2026Updated last month
- Medium Article☆11May 15, 2021Updated 4 years ago