The xlr-xldeploy-plugin is a XL Release plugin that allows to start a control task, start a deployment, migrate a deployment package to another server or get the latest version of an application on XL Deploy.
☆12May 25, 2019Updated 6 years ago
Alternatives and similar repositories for xlr-xldeploy-plugin
Users that are interested in xlr-xldeploy-plugin are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆42Mar 12, 2026Updated 2 weeks ago
- ldid and ldid2☆14Jun 25, 2018Updated 7 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Oct 17, 2020Updated 5 years ago
- Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326☆20Mar 16, 2022Updated 4 years ago
- ☆10Feb 20, 2017Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Aug 17, 2018Updated 7 years ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Multifarious x86-64 ELF binary that can be built once and run on six different *nix variants. Behaves differently if running on Linux, BS…☆17Aug 23, 2014Updated 11 years ago
- ☆16Jul 10, 2020Updated 5 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 3 months ago
- Blizzard CTF 2017: Sombra True Random Number Generator (STRNG).☆17May 20, 2018Updated 7 years ago
- Various math art notebooks☆15Mar 9, 2025Updated last year
- Mobile app for the Crownstone (Android & iOS). The apps are freely available from Google and Apple app stores. The code is based on React…☆16Jun 13, 2023Updated 2 years ago
- Documenting a process of producing x-ray images on film via cabinet x-ray machine.☆15Jan 23, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- Automate the receiving and processing of radio transmissions from overhead satellites with a Raspberry Pi.☆18Dec 20, 2024Updated last year
- RAWRR is a multiplatform app that assists with note taking and report generation for security evaluations.☆18Feb 8, 2023Updated 3 years ago
- Reversing Samsung SecretZone. Decrypt MSR files without any password! All thanks to Francesco Picasso. Only commercial (paid) support is …☆22Feb 13, 2026Updated last month
- ☆16Sep 20, 2022Updated 3 years ago
- Remote Java classpath enumeration via deserialization☆22May 23, 2023Updated 2 years ago
- Our aim is to build a multi-party 'off the record' messaging plugin for various clients.☆34Feb 9, 2014Updated 12 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆20Mar 21, 2018Updated 8 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Public sites and information related to Balkan countries that can be used for OSINT purposes.☆24Aug 16, 2023Updated 2 years ago
- GRFICSv3 is a FREE and open source OT security lab with realistic networking and a 3D process simulation for training and learning ICS se…☆96Mar 17, 2026Updated last week
- ☆28Jan 3, 2021Updated 5 years ago
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- ☆22May 11, 2022Updated 3 years ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆34Oct 3, 2024Updated last year
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Dec 18, 2017Updated 8 years ago
- Simulation of Industrial process unit on ESP32 board with ModbusTCP interface☆22Sep 19, 2020Updated 5 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Mar 26, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A font-based deception tool for red teaming, security research, and whatever else.☆57Mar 7, 2026Updated 3 weeks ago
- Straight-forward HTTP client testing, assertions included!☆30Nov 20, 2025Updated 4 months ago
- A python tool which runs to display random publicly disclosed Hackerone reports when bored. Automatically opens the report in browser.(Ad…☆42Dec 8, 2022Updated 3 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Nov 29, 2020Updated 5 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆44Aug 25, 2018Updated 7 years ago
- hiding in plain sight: part 2☆45Jul 11, 2024Updated last year
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago