Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Sonospy | 105 | 6 years ago | 40 | gpl-3.0 | Python | |||||
Sonospy is a UPnP control point and Windows Media proxy for the Sonos multi-room audio system. | ||||||||||
Lw Yara | 78 | 3 years ago | gpl-3.0 | YARA | ||||||
Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies | ||||||||||
Blazescan | 41 | 6 years ago | gpl-3.0 | Shell | ||||||
Blazescan is a linux webserver malware scanning and incident response tool, with built in support for cPanel servers, but will run on any linux based server. | ||||||||||
Nodescan | 28 | 4 | 7 years ago | 7 | November 05, 2016 | JavaScript | ||||
scans network for hosts and open ports | ||||||||||
Malicious Ip | 26 | 5 months ago | ||||||||
Aggregation of lists of malicious IP addresses that can be integrated into firewalls: FortiGate, Palo Alto, pfSense, IPtables | ||||||||||
Nextcloud Scanner | 22 | 6 months ago | 18 | agpl-3.0 | JavaScript | |||||
Scanner app for Nextcloud using the SANE framework | ||||||||||
Doboz Web | 15 | 13 years ago | 1 | other | JavaScript | |||||
Doboz: Web client and server for reprap/repstrap/3d scanner control | ||||||||||
Chaosmap | 13 | 13 years ago | gpl-3.0 | Python | ||||||
Chaosmap is an information gathering tool and dns / whois / web server scanner. | ||||||||||
Advanced Sql Injection Scanner | 11 | 3 years ago | C# | |||||||
Ivan Ricart Borges - Test for didactic purposes of web pages vulnerables to SQL injection using dbo database user with xp_cmdshell execution permissions. Using patterns from Internet search engines to extract potentially vulnerable web addresses and test them by changing the GET parameters using invalid Transact-SQL conversion function to cause through unhandled errors by IIS web server to show critical information. If certain features are given and using advanced injection techniques a malicious attacker could gain control of the entire system by executing shell commands in the SQL database engine. | ||||||||||
Squirt | 10 | a year ago | 1 | mit | Python | |||||