A tool to run a command when the target of a symlink changes
☆16Apr 28, 2016Updated 9 years ago
Alternatives and similar repositories for symwatch
Users that are interested in symwatch are comparing it to the libraries listed below
Sorting:
- Athenz is a role-based authorization (RBAC) system for provisioning and configuration (centralized authorization) use cases as well as se…☆13Oct 29, 2019Updated 6 years ago
- Fast, indexed regexp search over large file trees☆23Dec 5, 2019Updated 6 years ago
- ☆24Jun 8, 2019Updated 6 years ago
- Etherpad: real-time collaborative document editor☆10Mar 30, 2020Updated 5 years ago
- A shell script for running lightning talks with a cow as a compere.☆15Jun 5, 2020Updated 5 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- A security.txt parser for PHP☆12Oct 8, 2017Updated 8 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 3 months ago
- Convert curl commands to Go code in your browser☆18Jul 5, 2019Updated 6 years ago
- Make concurrent requests with the curl command-line tool☆76Oct 9, 2019Updated 6 years ago
- Async / concurrent HTTP requests for Go☆50Jun 29, 2023Updated 2 years ago
- Combine the lines from two files in every combination☆51Feb 18, 2018Updated 8 years ago
- Graphs in Cybersecurity - Bloodhound☆20Oct 8, 2024Updated last year
- Below are some simple methods for exiting vim.☆20Sep 25, 2019Updated 6 years ago
- Most common AWS S3 bucket names.☆29Jun 2, 2020Updated 5 years ago
- A security.txt parser for Go☆33Feb 10, 2019Updated 7 years ago
- Creates a standardised output of the contents of A GTM account☆10Jan 20, 2020Updated 6 years ago
- A repo for holding cheat sheets for myself that cover various penetration testing tools and commands.☆41May 21, 2018Updated 7 years ago
- ☆10Aug 23, 2023Updated 2 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- Draft and review content for MoJ IT Policy.☆11Sep 2, 2020Updated 5 years ago
- A tracing tool to analyze the I/O behavior of a program.☆12Sep 25, 2019Updated 6 years ago
- A protobuf plugin to generate parquet schemas.☆13Mar 9, 2022Updated 3 years ago
- Little HTML canvas VU meter visualisation☆34Feb 8, 2017Updated 9 years ago
- A Broken-URL Checker☆82Nov 2, 2017Updated 8 years ago
- use at your own risk☆37Nov 23, 2019Updated 6 years ago
- The All In One Script!☆10Feb 12, 2020Updated 6 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Smart Sessions with EIP-7702 EOA☆16Nov 15, 2024Updated last year
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- ☆12Feb 16, 2023Updated 3 years ago
- Scripts to automate RECON process☆11Aug 31, 2025Updated 6 months ago
- Golang HTTP Link header parser☆97Aug 11, 2025Updated 6 months ago
- Library of threat hunts to get any user started!☆49Sep 4, 2020Updated 5 years ago