-
China Telecom
-
09:01
(UTC +08:00)
-
-
-
-
org-tidy Public
Forked from jxq0/org-tidy🧹 An Emacs minor mode to automatically tidy org-mode property drawers
Emacs Lisp GNU General Public License v3.0 UpdatedFeb 8, 2025 -
-
-
openbas Public
Forked from OpenBAS-Platform/openbasOpen Breach and Attack Simulation Platform
Java Other UpdatedJan 8, 2025 -
doomemacs Public
Forked from doomemacs/doomemacsAn Emacs framework for the stubborn martian hacker
Emacs Lisp MIT License UpdatedDec 24, 2024 -
-
-
dotbot-yay Public
Forked from OxSon/dotbot-yayport of Niklas Heer's dotbot-yaourt plugin for use with yay
Python GNU General Public License v3.0 UpdatedNov 3, 2024 -
caldera Public
Forked from mitre/calderaAutomated Adversary Emulation Platform
Python Apache License 2.0 UpdatedNov 1, 2024 -
nmass Public
A python3 library that makes it easier to use nmap and masscan
-
cookiecutter-uv Public
Forked from fpgmaas/cookiecutter-uvA modern cookiecutter template for Python projects that use uv for dependency management
Python MIT License UpdatedOct 29, 2024 -
httpcore Public
Forked from encode/httpcoreA minimal HTTP client. ⚙️
Python BSD 3-Clause "New" or "Revised" License UpdatedOct 16, 2024 -
wapiti Public
Forked from wapiti-scanner/wapitiWeb vulnerability scanner written in Python3
Python GNU General Public License v2.0 UpdatedOct 12, 2024 -
airsearch Public archive
Asynchronous dirsearch
-
nmap Public
Forked from Ullaakut/nmapIdiomatic nmap library for go developers
Go MIT License UpdatedOct 10, 2024 -
katana Public
Forked from projectdiscovery/katanaA next-generation crawling and spidering framework.
-
nuclei Public
Forked from projectdiscovery/nucleiFast and customizable vulnerability scanner based on simple YAML based DSL.
Go MIT License UpdatedAug 13, 2024 -
nuclei-templates Public
Forked from projectdiscovery/nuclei-templatesCommunity curated list of templates for the nuclei engine to find security vulnerabilities.
JavaScript MIT License UpdatedAug 10, 2024 -
-
-
-
-
-
-
jndi-deceiver Public
Malicious servers for JNDI injection attacks
-
-