- Heaven
-
00:58
(UTC +08:00) - @kmahyyg@infosec.exchange
Highlights
Lists (11)
Sort Name ascending (A-Z)
Starred repositories
🎉 create a single executable out of your node.js apps
Prefect is a workflow orchestration framework for building resilient data pipelines in Python.
A flexible distributed key-value datastore that is optimized for caching and other realtime workloads.
Successor of Undetected-Chromedriver. Providing a blazing fast framework for web automation, webscraping, bots and any other creative ideas which are normally hindered by annoying anti bot systems …
Disables the "No valid subscription" dialog on all Proxmox products, all versions.
Generate test data that is not only realistic but also contextually meaningful
Session replay and product analytics you can self-host. Ideal for reproducing issues, co-browsing with users and optimizing your product.
Dorothy is a tool to test security monitoring and detection for Okta environments
The core backend server handling API requests and task management
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Frontier is an all-in-one user management platform that provides identity, access and billing management to help organizations secure their systems and data. (Open source alternative to Clerk)
Custom Selenium Chromedriver | Zero-Config | Passes ALL bot mitigation systems (like Distil / Imperva/ Datadadome / CloudFlare IUAM)
Noriben - Portable, Simple, Malware Analysis Sandbox
FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
《深入理解Linux进程与内存》一书的配套源码以及勘误列表
Arkime is an open source, large scale, full packet capturing, indexing, and database system.
Red team tool designed for quickly identifying hijackable programs, evading antivirus software, and EDR (Endpoint Detection and Response) systems. 红队工具旨在快速识别可劫持程序、逃避防病毒软件和 EDR(端点检测和响应)系统。
GoodbyeDPI — Deep Packet Inspection circumvention utility (for Windows)
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
A tool for exploring each layer in a docker image
SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket