☆10Oct 13, 2020Updated 5 years ago
Alternatives and similar repositories for Security
Users that are interested in Security are comparing it to the libraries listed below
Sorting:
- A lightweight type converter python library.☆13Oct 1, 2020Updated 5 years ago
- ☆13Feb 4, 2024Updated 2 years ago
- ☆83Mar 7, 2025Updated 11 months ago
- Intro To CTF In Arabic☆17Aug 3, 2020Updated 5 years ago
- ☆43Apr 25, 2021Updated 4 years ago
- ☆54Nov 3, 2022Updated 3 years ago
- ☆20Oct 5, 2022Updated 3 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Auto phishing form-based websites☆10Feb 20, 2020Updated 6 years ago
- This Project is a simple guide to be a certified MongoDB Developer with some important tips and notes☆13Jul 27, 2022Updated 3 years ago
- NestJs module to easily implement event driven architecture using RxJs in any NestJs project☆11Apr 1, 2022Updated 3 years ago
- This is a Recon & Inoformation Garhering Methodology In Bug Hunting Process☆15Sep 22, 2022Updated 3 years ago
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 2 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- Simple Sass mixin for RTL CSS☆13Feb 26, 2019Updated 7 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated 2 weeks ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆38Nov 8, 2017Updated 8 years ago
- ☆11Mar 18, 2021Updated 4 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- Training for Golang (go language)☆10Mar 29, 2019Updated 6 years ago
- ☆12Feb 20, 2025Updated last year
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- ☆10Aug 11, 2025Updated 6 months ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- A curated and collaborative list of awesome Crossplane resources☆15Apr 17, 2024Updated last year
- Decrypts blowfish (w. static key) encrypted hMail database password.☆15Feb 21, 2018Updated 8 years ago
- Hash Kit is tool Programmed by me . It consist of three sections : Encoding Hash , Decoding Hash , and Identifying Hash Id .☆12Dec 5, 2021Updated 4 years ago
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆17Aug 24, 2025Updated 6 months ago
- lightweight C++ library for parsing and manipulating INI (Initialization) files. INI files are simple text files that store configuration…☆13Aug 22, 2024Updated last year
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- ☆13Mar 21, 2024Updated last year
- QNAP N-Day (Probably not CVE-2020-2509)☆14Jul 27, 2022Updated 3 years ago
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆18Jul 9, 2025Updated 7 months ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 2 years ago
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- Example of creating desktop App to embed Firefox browser into Winform applications☆12Sep 29, 2019Updated 6 years ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Jun 14, 2023Updated 2 years ago