0dayCTF / security
Stuff about it-security that might be good to know
β18Updated 5 years ago
Alternatives and similar repositories for security:
Users that are interested in security are comparing it to the libraries listed below
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ42Updated 3 years ago
- Automate installation of extra pentest tools on Kali Linuxβ51Updated 3 years ago
- π A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ π©βπ»β18Updated 5 years ago
- CTF toolboxβ14Updated 4 years ago
- π€ The Modern Port Scanner π€β17Updated 3 years ago
- A Powerful Intruder written in Pythonβ10Updated 3 years ago
- Simple HTTP listener for security testingβ14Updated 2 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β11Updated 5 years ago
- Xfinity / Comcast Wordlist Generatorβ59Updated last year
- Subdomain Bruteforce - Bounty Quick Codeβ30Updated 5 months ago
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64β23Updated 3 months ago
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Seriesβ24Updated 3 years ago
- capNcook - a dark web exploration toolβ60Updated 10 months ago
- β22Updated 4 years ago
- β25Updated last month
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Contβ¦β93Updated last year
- A tool for WI-FI penetration testing that automates your attacking processes.β29Updated 6 months ago
- Generate common Reverse Shells for Pentestingβ40Updated 3 years ago
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. β¦β43Updated last year
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resourcesβ23Updated 3 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via β¦β40Updated 7 months ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bountyβ38Updated 5 months ago
- Herramienta de ingenierΓa social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.β65Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-hβ¦β66Updated 11 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectβ¦β75Updated 5 months ago
- Information Gathering Simplified.β64Updated 2 years ago
- Repository to put my notes related to OSCP certificationβ19Updated 5 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.β103Updated last year
- Who We Areβ19Updated 5 months ago
- Random stuffβ16Updated 8 months ago