Beagle(bone) in the Middle
☆25Oct 9, 2020Updated 5 years ago
Alternatives and similar repositories for BitM
Users that are interested in BitM are comparing it to the libraries listed below
Sorting:
- ☆12Aug 29, 2025Updated 6 months ago
- ☆18Sep 14, 2023Updated 2 years ago
- ☆14Mar 31, 2015Updated 10 years ago
- Recreated gerbers for the Supermicro X11SSH-F motherboard.☆16Aug 2, 2023Updated 2 years ago
- ACPI ASL highlighting for vim☆13Jul 30, 2016Updated 9 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Dec 8, 2015Updated 10 years ago
- Glitching an STM32F103☆14Jun 11, 2018Updated 7 years ago
- ☆33Apr 20, 2022Updated 3 years ago
- Programming software for RTD2662/RTD2660 with multiple interfaces☆17Aug 24, 2024Updated last year
- Generates visualizations from the output of flow tools such as SiLK.☆35Dec 8, 2016Updated 9 years ago
- fpga co-processor for faster SWD programming☆17Sep 16, 2017Updated 8 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Jan 25, 2016Updated 10 years ago
- German electrical symbols for Sweet Home 3D☆17Jun 7, 2019Updated 6 years ago
- ☆23Feb 16, 2016Updated 10 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- ☆73Apr 18, 2013Updated 12 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Aug 12, 2015Updated 10 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆24May 1, 2025Updated 10 months ago
- ☆30Apr 16, 2015Updated 10 years ago
- A lightweight PDF library optimized for metadata extraction and insertion☆14Jun 2, 2017Updated 8 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- ssh session type for metasploit☆101Feb 5, 2023Updated 3 years ago
- An opensource project similar to HoneyDocs☆26Oct 10, 2015Updated 10 years ago
- Allow unrestricted access to /dev/mem device on restricted Linux kernels☆20Mar 3, 2021Updated 5 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- Limit user logins by IP using pam_exec module☆12Aug 21, 2016Updated 9 years ago
- This is a web site scraper. Collects all urls from any site.☆16Apr 28, 2015Updated 10 years ago
- For when Plan A fails☆13Jan 24, 2012Updated 14 years ago
- Dump WMI informations from ACPI tables☆38Oct 11, 2021Updated 4 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆13Dec 20, 2019Updated 6 years ago
- MFS and CFG file manipulation utility☆32Feb 14, 2020Updated 6 years ago
- Endpoint monitoring stack.☆19Nov 5, 2015Updated 10 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- 👓 monitoring, alerting and threat analysis for ELK stack☆11Mar 27, 2017Updated 8 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆45Sep 12, 2016Updated 9 years ago
- Wordpress security scanner written in Python☆15Dec 10, 2011Updated 14 years ago
- Metasploit things, modules, plugins, exploits☆26Aug 8, 2014Updated 11 years ago