Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Phpsysinfo | 1,367 | 3 | 2 | 5 months ago | 25 | June 30, 2023 | 5 | gpl-2.0 | PHP | |
phpSysInfo: a customizable PHP script that displays information about your system nicely | ||||||||||
Ilruntime_hotgames | 380 | 2 years ago | C# | |||||||
基于ILRuntime的热更新能力实现的可以直接使用的框架,友情赠送C# WebService + WebSocketServer服务器端。 | ||||||||||
Audit Test Automation | 75 | 4 months ago | 28 | bsd-3-clause | PowerShell | |||||
The Audit Test Automation Package gives you the ability to get an overview about the compliance status of several systems. You can easily create HTML-reports and have a transparent overview over compliance and non-compliance of explicit setttings and configurations in comparison to industry standards and hardening guides. | ||||||||||
Nodeps | 44 | 8 years ago | 5 | gpl-3.0 | PowerShell | |||||
WebServer written in PowerShell | ||||||||||
Marlin | 26 | 4 months ago | 1 | mit | C++ | |||||
Web server and client framework | ||||||||||
Cve 2022 21907 | 17 | 2 years ago | gpl-3.0 | Ruby | ||||||
CVE-2022-21907: detection, protection, exploitation and demonstration. Exploitation: Powershell, Python, Ruby, NMAP and Metasploit. Detection and protection: Powershell. Demonstration: Youtube. | ||||||||||
Silverstripe Reqchecker | 12 | 7 years ago | PHP | |||||||
Check your server environment to see if it's up to scratch to support SilverStripe CMS / Framework (http://silverstripe.org) | ||||||||||
Webserver Error Pages | 11 | 3 years ago | agpl-3.0 | HTML | ||||||
📵 A drop-in replacement of 54, beautifully designed, user-friendly Apache 2, Nginx and Microsoft IIS HTTP error pages. | ||||||||||
Honeycomb Web Toolkit | 11 | 4 months ago | 24 | other | SCSS | |||||
Honeycomb | ||||||||||
Advanced Sql Injection Scanner | 11 | 3 years ago | C# | |||||||
Ivan Ricart Borges - Test for didactic purposes of web pages vulnerables to SQL injection using dbo database user with xp_cmdshell execution permissions. Using patterns from Internet search engines to extract potentially vulnerable web addresses and test them by changing the GET parameters using invalid Transact-SQL conversion function to cause through unhandled errors by IIS web server to show critical information. If certain features are given and using advanced injection techniques a malicious attacker could gain control of the entire system by executing shell commands in the SQL database engine. |