Skip to content
Change the repository type filter

All

    Repositories list

    • Analyzes HTML forms to determine if anti-CSRF tokens are present and correctly implemented, identify
      Python
      0000Updated Jul 26, 2025Jul 26, 2025
    • Randomly renames, reorders, and changes the data types of columns in a dataset to obfuscate its stru
      Python
      0000Updated Jul 26, 2025Jul 26, 2025
    • Generates a baseline of permission usage patterns to feed into anomaly detection systems, focusing o
      Python
      0000Updated Jul 26, 2025Jul 26, 2025
    • A command-line tool that takes a list of vulnerability IDs or security event logs and aggregates rel
      Python
      0000Updated Jul 26, 2025Jul 26, 2025
    • Analyzes smart contracts for unreachable or redundant code, highlighting potential vulnerabilities a
      Python
      0000Updated Jul 26, 2025Jul 26, 2025
    • Simplifies complex relationships between datasets by identifying and removing redundant or non-essen
      Python
      0000Updated Jul 25, 2025Jul 25, 2025
    • Replaces characters in sensitive data (like usernames or URLs) with visually similar homoglyphs to o
      Python
      0000Updated Jul 25, 2025Jul 25, 2025
    • Scans Docker images for known vulnerabilities using `grype` or `trivy` command-line tools. Presents
      Python
      0000Updated Jul 25, 2025Jul 25, 2025
    • Detects configurations that enable services which are currently inactive or not being used, suggesti
      Python
      0000Updated Jul 25, 2025Jul 25, 2025
    • Fuzzes API endpoints with various payloads (including SQL injection, command injection, and XSS) to
      Python
      0000Updated Jul 25, 2025Jul 25, 2025
    • Calculates the ratio of comments to code lines in a project or file. Identifies areas with poor comm
      Python
      0000Updated Jul 24, 2025Jul 24, 2025
    • Check an IP address or domain against multiple public blacklists (e.g., Spamhaus, AbuseIPDB) to dete
      Python
      0000Updated Jul 24, 2025Jul 24, 2025
    • Detects common authentication bypass vulnerabilities by testing for predictable usernames, default c
      Python
      0000Updated Jul 24, 2025Jul 24, 2025
    • Adjusts vulnerability severity scores based on user-defined rules using CVSS vectors. Allows overrid
      Python
      0000Updated Jul 24, 2025Jul 24, 2025
    • Scans configuration files and environment variables for hardcoded credentials, API keys, and other s
      Python
      0000Updated Jul 24, 2025Jul 24, 2025
    • Attempts to detect port knocking implementations by sending a sequence of packets to specified ports
      Python
      0000Updated Jul 23, 2025Jul 23, 2025
    • Performs intelligent URL fuzzing by mutating known URLs to discover hidden endpoints and files. - Fo
      Python
      0000Updated Jul 23, 2025Jul 23, 2025
    • Scans a given package name and version against the National Vulnerability Database (NVD) API to repo
      Python
      0000Updated Jul 23, 2025Jul 23, 2025
    • Tests the integration and performance of post-quantum Key Encapsulation Mechanisms (KEMs) within exi
      Python
      0000Updated Jul 23, 2025Jul 23, 2025
    • Validates package manifest files (e.g., `package.json`, `requirements.txt`, `pom.xml`) against commo
      Python
      0000Updated Jul 23, 2025Jul 23, 2025
    • Analyzes GRE (Generic Routing Encapsulation) packets to extract tunnel information and encapsulated
      Python
      0000Updated Jul 22, 2025Jul 22, 2025
    • Simulates form flood attacks by submitting numerous requests to a target form, allowing for testing
      Python
      0000Updated Jul 22, 2025Jul 22, 2025
    • Detects potential Host header injection vulnerabilities by manipulating the Host header and observin
      Python
      0000Updated Jul 22, 2025Jul 22, 2025
    • Scans network devices or hosts for known CVEs by banner grabbing and version identification. Uses a
      Python
      0000Updated Jul 22, 2025Jul 22, 2025
    • Generates a timeline of system events from various log files and metadata (file creation, modificati
      Python
      0000Updated Jul 22, 2025Jul 22, 2025
    • Command-line tool to normalize timestamps in file metadata (e.g., EXIF data, creation dates) to a st
      Python
      0000Updated Jul 21, 2025Jul 21, 2025
    • Quickly triages multiple IOCs (IP addresses, domains, hashes) against public threat intelligence fee
      Python
      0000Updated Jul 21, 2025Jul 21, 2025
    • Monitors print jobs, including document names, user accounts, and printer destinations. Detects unau
      Python
      0000Updated Jul 21, 2025Jul 21, 2025
    • Identifies dependencies between permissions (e.g., permission A is required for permission B to func
      Python
      0000Updated Jul 20, 2025Jul 20, 2025
    • Removes or modifies metadata associated with data sources (e.g., database server names, file paths,
      Python
      0000Updated Jul 20, 2025Jul 20, 2025