Headless chatbot that detects spam and posts links to it to chatrooms for quick deletion

SmokeDetector Headless chatbot that detects spam and posts it to chatrooms. Uses ChatExchange, takes questions from the Stack Exchange realtime tab, and accesses answers via the Stack Exchange API. Basic setup To set up SmokeDetector, please use git clone https://github.com/Charcoal-SE/SmokeDetector.git cd SmokeDetector git checkout deploy sudo pip3 install -r requirements.txt –upgrade pip3 install –user -r user_requirements.txt –upgrade Next, copy config.sample to a new file called config,and edit the values required. To run, use python3 nocrash.py(preferably in a daemon-able mode, like […]

Read more

A disposable encrypted chat-based application created to claim anonymity back

Harpocrate Security is the number 1 priority when it comes to Harpocrate as the goal is to become a platform for encrypted disposable chats, the purpose of making a disposable encrypted chat is to create a connection of encrypted channels and anonymity possible again. This is an open-source project meaning you can review all code and pen-test possible vulnerabilities if you have found any possible security threats make sure to create an Issue. If you are using an older version […]

Read more

Detect secret in source code and scan your repo for leaks with python

GitGuardian Shield Detect secret in source code, scan your repo for leaks. Find secrets with GitGuardian and prevent leaked credentials. GitGuardian is an automated secrets detection & remediation service. The GitGuardian shield (gg-shield) is a CLI application that runs in your local environment or in a CI environment to help you detect more than 200 types of secrets, as well as other potential security vulnerabilities or policy breaks. GitGuardian shield uses our public API through py-gitguardian to scan your files […]

Read more

An open protocol for secure real-time exchange of large datasets

Delta Sharing Delta Sharing is an open protocol for secure real-time exchange of large datasets, which enables organizations to share data in real time regardless of which computing platforms they use. It is a simple REST protocol that securely shares access to part of a cloud dataset and leverages modern cloud storage systems, such as S3, ADLS, or GCS, to reliably transfer data. With Delta Sharing, a user accessing shared data can directly connect to it through pandas, Tableau, Apache […]

Read more

A way to analyse how malware and/or goodware samples vary from each other

ByteCog ByteCog is a python script that aims to help security researchers and others a like to classify malicious software compared to other samples, depending on what the unknown file(s) is/are being tested against. This script can be extended to use a machine learning model to classify malware if you wanted to do so. ByteCog uses multiple methods of analyzing and classifying samples given to it, such as using Shannon Entropy to give a visual aspect for the researchers to […]

Read more

Remote control your Greenbone Vulnerability Manager

The Greenbone Vulnerability Management Tools gvm-tools are a collection of tools that help with remote controlling a Greenbone Security Manager (GSM) appliance and its underlying Greenbone Vulnerability Management (GVM) framework. The tools aid in accessing the communication protocols GMP (Greenbone Management Protocol) and OSP (Open Scanner Protocol). This module is comprised of interactive and non-interactive clients. The programming language Python is supported directly for interactive scripting. But it is also possible to issue remote GMP/OSP commands without programming in Python. […]

Read more

A simple python code example using MongoDB

Python with MongoDB A simple password manager I typed with python using MongoDB . How do i run this code • First of all you need to have a python on your computer. If you don’t have python on your computer, download it here • After downloading, you need to open a new terminal in the folder and type. pip install -r requirements.txt • After filling the config.json file, you can open the file named start.bat and start the script. […]

Read more

A Vulnerability Scanner & Auto Exploiter You can use this tool to check the security

Vulnnr create a target list or select one target, scans then exploits, done!Vulnnr is a Vulnerability Scanner & Auto Exploiter You can use this tool to check the security by finding the vulnerability in your website or you can use this tool to Get Shells Offers LFI Scanners > Coming soon XSS Scanners > Working SQLI injection scanners > Working Domain Scanner > Using hackerone API/finds subdoamins CMS detector > Working Server detector > Working Common vulnerable files Scanner > […]

Read more

An Obfuscation-Neglect Android Malware Scoring System

Quark-Engine Quark-Engine is also bundled with Kali Linux, BlackArch. :shipit: A trust-worthy, practical tool that’s ready to boost up your malware reverse engineering. Why Quark? Android malware analysis engine is not a new story. Every antivirus company has their own secrets to build it. With curiosity, we develop a malware scoring system from the perspective of Taiwan Criminal Law in an easy but solid way. We have an order theory of criminal which explains stages of committing a crime. For […]

Read more

An extensive password manager built using Python

Python Password Manager Multiple implementations for a password manager, all based on python. Choose an implementation based on what features you’d like!More implementations on the way! Demo TK-ENCRYPTED: The Tkinter-based, encrypted-files driven password manager. TUI-MONGO: The Tui-based, mongo driven password manager. GitHub https://github.com/SamDev98/password-manager-py    

Read more
1 2 3 4