Beagle(bone) in the Middle
☆25Oct 9, 2020Updated 5 years ago
Alternatives and similar repositories for BitM
Users that are interested in BitM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Aug 29, 2025Updated 8 months ago
- ☆18Sep 14, 2023Updated 2 years ago
- ☆14Mar 31, 2015Updated 11 years ago
- Recreated gerbers for the Supermicro X11SSH-F motherboard.☆16Aug 2, 2023Updated 2 years ago
- ACPI ASL highlighting for vim☆13Jul 30, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Dec 8, 2015Updated 10 years ago
- Glitching an STM32F103☆14Jun 11, 2018Updated 7 years ago
- ☆33Apr 20, 2022Updated 4 years ago
- Programming software for RTD2662/RTD2660 with multiple interfaces☆17Aug 24, 2024Updated last year
- Generates visualizations from the output of flow tools such as SiLK.☆34Dec 8, 2016Updated 9 years ago
- fpga co-processor for faster SWD programming☆17Sep 16, 2017Updated 8 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Jan 25, 2016Updated 10 years ago
- German electrical symbols for Sweet Home 3D☆17Jun 7, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆23Feb 16, 2016Updated 10 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- ☆73Apr 18, 2013Updated 13 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Aug 12, 2015Updated 10 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆24May 1, 2025Updated 11 months ago
- ☆30Apr 16, 2015Updated 11 years ago
- A lightweight PDF library optimized for metadata extraction and insertion☆14Jun 2, 2017Updated 8 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ssh session type for metasploit☆101Feb 5, 2023Updated 3 years ago
- An opensource project similar to HoneyDocs☆26Oct 10, 2015Updated 10 years ago
- Allow unrestricted access to /dev/mem device on restricted Linux kernels☆20Mar 3, 2021Updated 5 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- Limit user logins by IP using pam_exec module☆12Aug 21, 2016Updated 9 years ago
- This is a web site scraper. Collects all urls from any site.☆16Apr 28, 2015Updated 11 years ago
- Dump WMI informations from ACPI tables☆38Mar 23, 2026Updated last month
- For when Plan A fails☆13Jan 24, 2012Updated 14 years ago
- MFS and CFG file manipulation utility☆32Feb 14, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆13Dec 20, 2019Updated 6 years ago
- Endpoint monitoring stack.☆19Nov 5, 2015Updated 10 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- 👓 monitoring, alerting and threat analysis for ELK stack☆11Mar 27, 2017Updated 9 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆45Sep 12, 2016Updated 9 years ago
- Wordpress security scanner written in Python☆15Dec 10, 2011Updated 14 years ago
- Metasploit things, modules, plugins, exploits☆26Aug 8, 2014Updated 11 years ago