JwtA JWT (JSON Web Token) Encoder & Decoder
Stars: ✭ 107 (-2.73%)
OfficelifeOfficeLife manages everything employees do in a company. From projects to holidays to 1 on 1s to ... 🚀
Stars: ✭ 90 (-18.18%)
PdflayouttextstripperConverts a pdf file into a text file while keeping the layout of the original pdf. Useful to extract the content from a table in a pdf file for instance. This is a subclass of PDFTextStripper class (from the Apache PDFBox library).
Stars: ✭ 1,369 (+1144.55%)
Portablesigner2PortableSigner - A Commandline and GUI Tool to digital sign PDF files with X.509 certificates
Stars: ✭ 92 (-16.36%)
DekstereconWeb Application recon automation
Stars: ✭ 109 (-0.91%)
Password LeakA library to check for compromised passwords
Stars: ✭ 92 (-16.36%)
Awesome Aws SecurityCurated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Security
Stars: ✭ 100 (-9.09%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-19.09%)
Pentest NotesCollection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (-19.09%)
Mit Deep Learning Book PdfMIT Deep Learning Book in PDF format (complete and parts) by Ian Goodfellow, Yoshua Bengio and Aaron Courville
Stars: ✭ 9,859 (+8862.73%)
PdfmergeCommand-line utility for merging, splicing, and rotating PDF documents.
Stars: ✭ 88 (-20%)
Fisy FuzzThis is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.
Stars: ✭ 110 (+0%)
PowershellarmouryA PowerShell armoury for penetration testers or other random security guys
Stars: ✭ 99 (-10%)
GrobidA machine learning software for extracting information from scholarly documents
Stars: ✭ 1,275 (+1059.09%)
Backfuzzprotocol fuzzing toolkit
Stars: ✭ 106 (-3.64%)
RitaReal Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Stars: ✭ 1,352 (+1129.09%)
CatnipCat-Nip Automated Basic Pentest Tool - Designed For Kali Linux
Stars: ✭ 108 (-1.82%)
GraphicsrendererA drop-in UIGraphicsRenderer port -- CrossPlatform, Swift 4, Image & PDF
Stars: ✭ 85 (-22.73%)
TelerReal-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+1034.55%)
PatrowldocsPatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 105 (-4.55%)
React Pdf📄 Create PDF files using React
Stars: ✭ 10,153 (+9130%)
Pdf GeneratorCordova plugin to generate pdf in the client-side
Stars: ✭ 98 (-10.91%)
Koreader BaseBase framework offering a Lua scriptable environment for creating document readers
Stars: ✭ 81 (-26.36%)
Pdf GeneratorPDF Generator library, easy way to create PDF from String Content or Any HTML Content.
Stars: ✭ 110 (+0%)
Fe Necessary Book A book and software collection about frontend
Stars: ✭ 1,239 (+1026.36%)
Universal ResumeMinimal and formal résumé (CV) website template for print, mobile, and desktop. https://bit.ly/ur_demo
Stars: ✭ 1,349 (+1126.36%)
Word2pdf Tools📝通过LibreOffice / WPS / Microsoft Office / 第三方库 实现多种word转pdf格式的方案
Stars: ✭ 82 (-25.45%)
Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-4.55%)
SentinlKibana Alert & Report App for Elasticsearch
Stars: ✭ 1,233 (+1020.91%)
VsauditVOIP Security Audit Framework
Stars: ✭ 97 (-11.82%)
Sysmon ModularA repository of sysmon configuration modules
Stars: ✭ 1,229 (+1017.27%)
EmbedosEmbedOS - Embedded security testing virtual machine
Stars: ✭ 108 (-1.82%)
JfbviewPDF and image viewer for the Linux framebuffer.
Stars: ✭ 78 (-29.09%)
ExamsPast Exams for UC Berkeley EECS Courses. PR more if you have!
Stars: ✭ 97 (-11.82%)
Deerlet[Deprecated] A markdown online-editable-resume with pdf generator
Stars: ✭ 79 (-28.18%)
KarnSimplifying Seccomp enforcement in containerized or non-containerized apps
Stars: ✭ 104 (-5.45%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-28.18%)
GorshA Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
Stars: ✭ 97 (-11.82%)
AbiwordOfficial Mirror of the AbiWord git repository - Read-Only
Stars: ✭ 77 (-30%)
PdfaltoPDF to XML ALTO file converter
Stars: ✭ 109 (-0.91%)
PyhankopyHanko: sign and stamp PDF files
Stars: ✭ 77 (-30%)
Virtual OfficeVirtual Office gives you transparency on what Zoom.us rooms are currently occupied and who is present
Stars: ✭ 103 (-6.36%)
Canvas2pdfExport your HTML canvas to PDF
Stars: ✭ 96 (-12.73%)
PhpspreadsheetA pure PHP library for reading and writing spreadsheet files
Stars: ✭ 10,627 (+9560.91%)
FbpdfA small framebuffer pdf, djvu, epub, xps, and cbz viewer
Stars: ✭ 103 (-6.36%)
Workdiary병특 재택근무 수행내역서를 채워주는 util
Stars: ✭ 75 (-31.82%)
Radio HackboxPoC tool to demonstrate vulnerabilities in wireless input devices
Stars: ✭ 74 (-32.73%)
M4ngl3m3Common password pattern generator using strings list
Stars: ✭ 103 (-6.36%)
RobustpentestmacroThis is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploitation techniques.
Stars: ✭ 95 (-13.64%)
AmdhAndroid Mobile Device Hardening
Stars: ✭ 95 (-13.64%)
Mschart📊 mschart: office charts from R
Stars: ✭ 94 (-14.55%)