theblackcat102 / awesome-code-obfuscation
Collections of code obfuscation libaries for different languages ( in progress )
☆12Updated 2 years ago
Alternatives and similar repositories for awesome-code-obfuscation:
Users that are interested in awesome-code-obfuscation are comparing it to the libraries listed below
- A tool to encode and decode content as whitespace☆16Updated last year
- An SSH honeypot written entirely in Go.☆13Updated 2 months ago
- A curated list of Cloud Security techniques and tools☆30Updated last year
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.☆20Updated last year
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 2 years ago
- all things awesome security☆12Updated 9 years ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- Action to fix PHP Coding Standards☆21Updated 10 months ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 3 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- The Zonemaster GUI - part of the Zonemaster project☆15Updated 2 weeks ago
- Library of Crypto exploits☆10Updated last year
- ☆17Updated last year
- Contextal Platform, a powerful, open-source cybersecurity solution designed for contextual threat detection and intelligence.☆27Updated last week
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Distributed network and vulnerability scanner☆47Updated last year
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated last month
- personal fork of OSINT tool recon-ng☆17Updated 7 years ago
- A directory of cheat sheets to use with TLDR, cheat.sh, or Navi☆14Updated 2 months ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated last year
- A utility to log in to AWS using aws-vault with secrets stored in 1Password☆12Updated last year
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆10Updated 10 months ago
- A powerful shell script tool for managing multiple SSH tunnels concurrently.☆12Updated last year
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆14Updated last year
- THOR APT Scanner User Manual☆18Updated last week
- Curated list of ransomware-related resources; awesome style.☆16Updated 2 months ago
- Dive into Awesome lists and explore GitHub repositories for you.☆11Updated 2 years ago