a grep -r for secrets
☆180May 4, 2022Updated 3 years ago
Alternatives and similar repositories for blueflower
Users that are interested in blueflower are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scapy hands-on at #GreHack16☆16Nov 19, 2016Updated 9 years ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆244Sep 13, 2021Updated 4 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆432Nov 17, 2017Updated 8 years ago
- HTTP-traceroute in Go☆19Oct 19, 2015Updated 10 years ago
- ssh key exchange layer for scapy☆13Oct 27, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Feb 19, 2021Updated 5 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Fun with the TLS handshake☆31Jun 8, 2014Updated 11 years ago
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 10 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- ☆15Apr 9, 2018Updated 8 years ago
- This is a toy implementation of the dudect ideas in Go. All credit goes to Oscar Reparaz, Josep Balasch and Ingrid Verbauwhede for dudect…☆19Jul 12, 2017Updated 8 years ago
- arbitrary memory read/write by IMemroy OOB☆36Apr 8, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- Reconstruct process trees from event logs☆148Aug 12, 2020Updated 5 years ago
- A project in Golang that will create prefix-based magic MD5 hashes for type juggling.☆21Jul 29, 2018Updated 7 years ago
- C++-based shellcode builder☆115Nov 19, 2020Updated 5 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆824Nov 3, 2017Updated 8 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- Tool for scanning Cisco router products over SSH☆55Dec 17, 2014Updated 11 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 11 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆194Oct 6, 2017Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- The modular distributed fingerprinting engine☆220Aug 6, 2018Updated 7 years ago
- A Python command line argument to object parsing library for command line application development☆15Mar 23, 2016Updated 10 years ago
- proxy poc implementation of STARTTLS stripping attacks☆169Nov 25, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆763Jan 28, 2019Updated 7 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- Teach you a binary exploitation for great good.☆294Sep 26, 2018Updated 7 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago