Python SDK to access the vulnerability database
☆22Sep 5, 2019Updated 6 years ago
Alternatives and similar repositories for python-sdk
Users that are interested in python-sdk are comparing it to the libraries listed below
Sorting:
- HMAC timing attack's w/ statistical analysis☆23Sep 19, 2013Updated 12 years ago
- User, contributor and developer friendly vulnerability database☆128Dec 14, 2018Updated 7 years ago
- My solutions to Matasano Cryptopals challenge.☆30Nov 2, 2014Updated 11 years ago
- Repository to store unique seeds for DNS server fuzzing☆45Feb 18, 2016Updated 10 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Occupy WiFi Firmware☆11Sep 14, 2015Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Nov 4, 2014Updated 11 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Aug 13, 2015Updated 10 years ago
- **BETA** A simple buildscript for network security monitoring on RHEL/CentOS☆31Apr 4, 2017Updated 8 years ago
- eSentire additions to the nmap network scanner☆14Mar 29, 2016Updated 9 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- This repository contains hit lists to use for web application content discovery.☆11May 31, 2017Updated 8 years ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- RESTful interface to your operating system shell☆19Nov 8, 2017Updated 8 years ago
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Mar 7, 2015Updated 11 years ago
- Limit user logins by IP using pam_exec module☆12Aug 21, 2016Updated 9 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Jul 1, 2015Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- Access My Info Frontend☆12Oct 16, 2019Updated 6 years ago
- Tool used to continuously monitor a Github org for mistaken public commits☆167Feb 23, 2016Updated 10 years ago
- ☆20Feb 28, 2018Updated 8 years ago
- Stuff that I created while doing my GSM-security research☆22Oct 19, 2013Updated 12 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- cracked password☆20Oct 2, 2013Updated 12 years ago
- ☆23Nov 18, 2015Updated 10 years ago
- Store arbitrary data on Flickr☆273May 28, 2013Updated 12 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Mar 19, 2015Updated 11 years ago
- Multithreaded SQL union bruteforcer☆16Sep 9, 2011Updated 14 years ago
- Falcon: A practical log-based analysis tool for distributed systems☆32Apr 3, 2021Updated 4 years ago
- Scripts for Looking up OUIs or Vendor information from MAC addresses☆11Dec 24, 2023Updated 2 years ago
- A tool for netpens.☆37Jun 18, 2019Updated 6 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago
- FxCop rules that aim to help security audit on .NET applications.☆14Nov 10, 2017Updated 8 years ago