Configuration security analyzer for network devices. Pynipper-ng is an evolution of nipper-ng, updated and translated to python. [ALPHA version]
☆30Mar 20, 2026Updated this week
Alternatives and similar repositories for pynipper-ng
Users that are interested in pynipper-ng are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Clouditor is a tool to support continuous cloud assurance. Developed by Fraunhofer AISEC.☆85Mar 11, 2026Updated 2 weeks ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last month
- Choices choices, which is the one?☆13Nov 22, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆19Dec 30, 2023Updated 2 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- Espaço dedicado a discussões e tira dúvida sobre disciplinas e conteúdo tecnológico.☆11Jan 8, 2018Updated 8 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- Rust Weaponization for Red Team Engagements.☆15Oct 9, 2021Updated 4 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Dec 10, 2015Updated 10 years ago
- ☆29May 19, 2023Updated 2 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Damn Simple Vulnerable Python Web Application☆18Jun 5, 2024Updated last year
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- CommandInWiFi: Exploiting SSID Storage in WiFi Scanning for Command Injection☆38Mar 9, 2026Updated 2 weeks ago
- Efficient, flexible, and accurate client-side file identification tool☆20Aug 21, 2013Updated 12 years ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- Burp Suite extension designed to help security professionals search for custom sensitive information in HTTP responses☆11Apr 25, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 一个用于修改右键插 件菜单层级的Burpsuite插件。A simple BurpSuite extension to change extension context menu level.☆14Jan 15, 2024Updated 2 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 4 months ago
- Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live opera…☆18Jun 27, 2022Updated 3 years ago
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday prog…☆10May 19, 2023Updated 2 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated 2 months ago
- Gatekeeper: Long Range RFID Stealing and Cloning☆19Apr 16, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Nextcloud App that shows File-Upload Details in Progress Bar☆12Feb 15, 2020Updated 6 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- Non-Alphanumeric JS Obfuscator☆14Aug 22, 2016Updated 9 years ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- Try `telnet macnugget.org`☆13Nov 17, 2025Updated 4 months ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- All Labs of the Security for Developers Training☆10Feb 10, 2023Updated 3 years ago