0ur4n05 / ops_scanner
Open Redirect scanner
☆18Updated 2 years ago
Alternatives and similar repositories for ops_scanner:
Users that are interested in ops_scanner are comparing it to the libraries listed below
- Simple encryption tool designed to perform a bitwise XOR operation (XORing) on the contents of files with specific extensions in a given …☆20Updated 8 months ago
- The Hack3r News B'darija☆18Updated 2 years ago
- Network Shredder IDS☆11Updated 7 months ago
- Restful Api developed with Flask using Prometheus and Grafana for monitoring and containerization with Docker☆17Updated last year
- Framework For Exploring kernel vulnerabilities, network vulnerabilities ✨☆25Updated last year
- CVE-2023-38831 winrar exploit generator and get reverse shell☆11Updated last year
- A tool that encrypt and hide your data inside your images.☆30Updated 3 years ago
- ☆14Updated last year
- This tool is a versatile implementation of the Affine Cipher, a classical encryption algorithm that combines modular arithmetic and linea…☆23Updated 8 months ago
- Ray-casting game for wasting productive time.☆11Updated 3 years ago
- DarkSpy facilitates a secure and educational environment to comprehend the mechanics of establishing connections between two machines. Th…☆46Updated 8 months ago
- some of my IOCs from malware investigations☆10Updated 2 years ago
- WinGPG is a tray-based classical Windows application, Windows NT Explorer shell extension, and a classic GPGv2 distribution. Secure your …☆12Updated 3 years ago
- Ressources for following my youtube C tutorials☆13Updated 3 years ago
- "TheJudgment," a captivating steganography challenge that will test your skills in uncovering hidden messages. Immerse yourself in a worl…☆17Updated 10 months ago
- Osint French People Location☆15Updated 2 years ago
- penetration testing utilities☆10Updated 4 years ago
- Writeups of CTFs i play - this repository will also include POCs, RFCs and Related Resources to support the writeups.☆8Updated 2 years ago
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Updated 3 years ago
- Practice typing and improve your typing speed (WPM).☆10Updated 4 years ago
- My attempt to reverse the Discord nitro token generation function.☆29Updated 6 months ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆17Updated 3 years ago
- A really good cybersec reading materials.☆13Updated 2 years ago
- A potent tool designed for efficiently cracking MD5 hashes using an online wordlist. This repository provides a robust solution for secur…☆13Updated 8 months ago
- linux debugger☆11Updated last year
- CIT Cyber Security Cell Bootcamp Training modules☆37Updated 3 years ago
- The Hacking Week☆2Updated 2 years ago
- Test your Security Skills, and Clean Code Development as a Pythonist, Hacker & Warrior 🥷🏻☆46Updated 2 months ago
- Boilerplate to Setup Authentication using Django-all auth 🚀☆14Updated 3 years ago
- A Next.js, Tailwind CSS blogging Template. Used to Create my Blog☆23Updated last year