V-Demon

V-Demon

Geek Repo

Github PK Tool:Github PK Tool

V-Demon's repositories

100-pandas-puzzles

100 short data puzzles for pandas, ranging from very easy to super tricky

Language:Jupyter NotebookStargazers:0Issues:0Issues:0

auto-doc

Regex based patching toolkit for binary modification

Language:PythonLicense:UnlicenseStargazers:0Issues:0Issues:0

cahute

Communication and file format handling tools for CASIO calculators. (mirror from Gitlab)

Language:CLicense:NOASSERTIONStargazers:0Issues:0Issues:0

circe

Machine learning Jupyter notebooks. https://charlesreid1.github.io/circe

Language:Jupyter NotebookLicense:MITStargazers:0Issues:0Issues:0

cli

Snyk CLI scans and monitors your projects for security vulnerabilities.

Language:TypeScriptLicense:NOASSERTIONStargazers:0Issues:0Issues:0

cloudfox

Automating situational awareness for cloud penetration tests.

Language:GoLicense:MITStargazers:0Issues:0Issues:0

Egyscan

Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against malicious threats. Let's delve into the tasks and functions that make Egyscan an indispensable tool in your security arsenal:

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

Examples

Config files samples for various Apps (No secrets in it :# )

Stargazers:0Issues:1Issues:0

eyeballer

Convolutional neural network for analyzing pentest screenshots

Language:PythonLicense:GPL-3.0Stargazers:0Issues:0Issues:0

ggshield

Find and fix 360+ types of hardcoded secrets and 70+ types of infrastructure-as-code misconfigurations.

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

numpy-100

100 numpy exercises

Language:Jupyter NotebookLicense:MITStargazers:0Issues:0Issues:0

retdec

RetDec is a retargetable machine-code decompiler based on LLVM.

Language:C++License:MITStargazers:0Issues:0Issues:0

RosettaGit

Solutions to tasks in over 700 programming languages

Language:HTMLStargazers:0Issues:0Issues:0
Stargazers:0Issues:1Issues:0

HardwareAllTheThings

Hardware/IOT Pentesting Wiki

License:MITStargazers:0Issues:0Issues:0

harpoon

A collection of scripts, and tips and tricks for hacking k8s clusters and containers.

Language:GoLicense:MITStargazers:0Issues:0Issues:0

hosts

đź”’ Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

infosec-dorks

A Personal Collection of Infosec Dorks

Stargazers:0Issues:0Issues:0

InternalAllTheThings

Active Directory and Internal Pentest Cheatsheets

Language:HTMLStargazers:0Issues:0Issues:0

ip2geo

Script to perform bulk local GeoIP lookups (ASN and geo) for IP addresses

Language:PythonStargazers:0Issues:0Issues:0

jsleak

jsleak is a tool to find secret , paths or links in the source code during the recon.

Language:GoStargazers:0Issues:0Issues:0

lisp

CLISP based Common Lisp interpreter/compiler. Very compact C++ implementation.

Language:Common LispLicense:GPL-3.0Stargazers:0Issues:0Issues:0

malicious_ip_addresses

These are the IP addresses of the most active C2/Botnets/Zombies/Scanners in European Cyber Space

Stargazers:0Issues:0Issues:0

Multigrab-IOCs

Extracted from TH repo

Stargazers:0Issues:1Issues:0

netlas-dorks

A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to search for IoT elements, protocols, communication tools, remote access, and more. Over time, the list will grow.

Stargazers:0Issues:0Issues:0

oeis-search

search offline dumps of the OEIS

Language:PythonLicense:GPL-3.0Stargazers:0Issues:0Issues:0

reconftw

reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities

Language:ShellLicense:MITStargazers:0Issues:0Issues:0

rengine

reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface.

Language:PythonLicense:GPL-3.0Stargazers:0Issues:0Issues:0

SecretScanner

:unlock: :unlock: Find secrets and passwords in container images and file systems :unlock: :unlock:

Language:GoLicense:MITStargazers:0Issues:0Issues:0

vulnerable-node

A very vulnerable web site written in NodeJS with the purpose of have a project with identified vulnerabilities to test the quality of security analyzers tools tools

Language:JavaScriptLicense:NOASSERTIONStargazers:0Issues:0Issues:0