Providing a comprehensive database of hardware affected by the USB Power Surge attack
β15Sep 18, 2016Updated 9 years ago
Alternatives and similar repositories for community
Users that are interested in community are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Password reset key generator for some Hikvision devicesβ17May 30, 2020Updated 5 years ago
- π¬ A collection of awesome resources for the Flipper Zero device.β15Apr 29, 2022Updated 3 years ago
- WigleAPI-JSON in PHP with JSON Responseβ14Nov 18, 2013Updated 12 years ago
- Mattermost is an open source platform for secure collaboration across the entire software development lifecycle..β28Oct 20, 2025Updated 5 months ago
- Search inside Snowden/NSA/GCHQ/whatever documentsβ11Jul 11, 2014Updated 11 years ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Real-time airport timetable data.β12Nov 6, 2023Updated 2 years ago
- Scala library that shells to Tesseract to make PDFs searchableβ16Jan 25, 2019Updated 7 years ago
- Here comes the paintrain!β11Aug 8, 2016Updated 9 years ago
- Literate programming for any language. It's π₯.β17Jan 18, 2019Updated 7 years ago
- M5Stack dropdown menu code sampleβ15Feb 5, 2019Updated 7 years ago
- Rdio Scanner is an open source software that ingest and distribute audio files generated by various software-defined radio recorders. Itsβ¦β33Apr 6, 2022Updated 4 years ago
- Tool to run Titanium mobile tests in Appiumβ15Nov 28, 2017Updated 8 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with β¦β10Feb 15, 2017Updated 9 years ago
- A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.β15Nov 6, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- BLE based C2 for Hak5's Bash Bunnyβ19Oct 31, 2023Updated 2 years ago
- Grunt EJS Static is a static site generator built with EJS and Grunt. Pages are defined in JSON by declaring the layout file and any addiβ¦β31Feb 2, 2018Updated 8 years ago
- Consolidated demo and source links from Bryant Zadegan and Ryan Lester's Black Hat / DEF CON talk "Abusing Bleeding Edge Web Standards foβ¦β11Aug 19, 2017Updated 8 years ago
- A high-performance domain scanner that discovers active domains by testing multiple Top-Level Domains (TLDs) for given domain names.β30Oct 26, 2025Updated 5 months ago
- CTF Challenge for CSAW Finals 2021β13Nov 17, 2021Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sysβ¦β12Apr 13, 2017Updated 8 years ago
- Script en bash de Nmap que se puede personalizar para ajustar el escaneo a tus necesidades.β13Jul 20, 2024Updated last year
- This tool was made to help others fix their server's WMI Repository when they're corrupted or experiencing related issued, for many IT Prβ¦β30Dec 24, 2018Updated 7 years ago
- Dynamically Compiled O2 Scripts Folderβ19Mar 7, 2016Updated 10 years ago
- NordVPN Special Discount Offer β’ AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A simple utility to check the status of and/or disable SMBv1 on Windows system via Cb Response's Live Response functionality.β15May 28, 2019Updated 6 years ago
- MacroExploit use in excel sheetβ20Jun 12, 2023Updated 2 years ago
- β16May 7, 2025Updated 11 months ago
- Tinkering with bits and bytesβ11Dec 14, 2024Updated last year
- Exploiting Software-Defined Radio - Common attacks and a device to exploit them (Proof of Concept).β17Jan 12, 2021Updated 5 years ago
- A fast and efficient website downloader written in Rust.β17Aug 2, 2025Updated 8 months ago
- β12Dec 16, 2016Updated 9 years ago
- Exploits for Dell EMC RecoverPoint enterprise data protection platformβ13Jun 22, 2018Updated 7 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checksβ10Jan 27, 2014Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Hourly Checked and Updated IP Ranges of AWS Serversβ20Feb 27, 2024Updated 2 years ago
- TFTP Theft is a tool which allows one to quickly scan/bruteforce a tftp server for files and download them instantlyβ69Apr 20, 2016Updated 9 years ago
- Some V8 n-day exploits that I've writtenβ54Mar 1, 2026Updated last month
- raster badge proxy that look okay if you squint enough πβ20Dec 21, 2025Updated 3 months ago
- Modified version of Duckuino to convert Ducky Script for use with Devices running ESPloit(Cactus WHID)β13Oct 11, 2017Updated 8 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.β11Mar 29, 2017Updated 9 years ago
- C library for quantum-resistant cryptographic algorithms.β12Jun 21, 2018Updated 7 years ago