☆10Oct 13, 2020Updated 5 years ago
Alternatives and similar repositories for Security
Users that are interested in Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A lightweight type converter python library.☆13Oct 1, 2020Updated 5 years ago
- ☆13Feb 4, 2024Updated 2 years ago
- ☆83Mar 7, 2025Updated last year
- Intro To CTF In Arabic☆17Aug 3, 2020Updated 5 years ago
- ☆43Apr 25, 2021Updated 4 years ago
- Hash Kit is tool Programmed by me . It consist of three sections : Encoding Hash , Decoding Hash , and Identifying Hash Id .☆12Dec 5, 2021Updated 4 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- ☆20Oct 5, 2022Updated 3 years ago
- ☆54Nov 3, 2022Updated 3 years ago
- ☆11Mar 18, 2021Updated 5 years ago
- Auto phishing form-based websites☆10Feb 20, 2020Updated 6 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Apr 25, 2013Updated 12 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆38Nov 8, 2017Updated 8 years ago
- Ultimate DevSecOps library☆14Nov 13, 2022Updated 3 years ago
- Burp Suite JSON/JS-Beautifier☆14Sep 17, 2019Updated 6 years ago
- NestJs module to easily implement event driven architecture using RxJs in any NestJs project☆11Apr 1, 2022Updated 3 years ago
- ☆14Dec 9, 2021Updated 4 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- Training for Golang (go language)☆10Mar 29, 2019Updated 6 years ago
- Fast tool to extract all subdomains from crt.sh website. Output will be up to sub.sub.sub.subdomain.com with standard and advanced search…☆115Nov 3, 2021Updated 4 years ago
- A configurable rule-based labeling tool for network flow files.☆18May 22, 2023Updated 2 years ago
- This Project is a simple guide to be a certified MongoDB Developer with some important tips and notes☆13Jul 27, 2022Updated 3 years ago
- ☆21Dec 8, 2022Updated 3 years ago
- Small attempt at a decent Import Address Table (IAT) Dumper☆15Aug 25, 2024Updated last year
- ☆14May 9, 2020Updated 5 years ago
- Writeups Of CTFlearn Challenges☆17Jan 25, 2024Updated 2 years ago
- All the CTF tools you need in a docker container just one command away.☆23Jun 16, 2025Updated 9 months ago
- Takes a list of domains as the input, checks if they have a security.txt, outputs the results.☆16May 15, 2020Updated 5 years ago
- Some python scripts to do tasks☆10Apr 26, 2021Updated 4 years ago
- This is a Recon & Inoformation Garhering Methodology In Bug Hunting Process☆15Sep 22, 2022Updated 3 years ago
- JSONPath extension for BurpSuite☆30Nov 2, 2025Updated 4 months ago
- Analysis Reports of Malwares☆14Jun 21, 2019Updated 6 years ago
- Event Driven Architecture using NestJs for microservices and RabbitMQ as the message broker for intercommunication between microservices …☆16Jan 18, 2024Updated 2 years ago
- A Backend for an Job Postings Application made in Node js using Nest js framework. Microservice architecture is applied using RabbitMQ.☆12May 26, 2024Updated last year
- GG Dorking is a tool to generate GitHub and Google dorking for pentesters and bug bounty hunters.☆102Jul 12, 2025Updated 8 months ago
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Nov 6, 2023Updated 2 years ago
- BugBounty , sort and delete duplicates param value without missing original value☆22Jul 31, 2021Updated 4 years ago
- Simple Sass mixin for RTL CSS☆13Feb 26, 2019Updated 7 years ago