Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
☆77Apr 30, 2026Updated last week
Alternatives and similar repositories for Archive
Users that are interested in Archive are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Dec 31, 2021Updated 4 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intres…☆11Dec 25, 2020Updated 5 years ago
- 🐶 A curated list of Web Security materials and resources. With repository stars⭐ and forks🍴☆20May 2, 2026Updated last week
- ☆41Jul 24, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- ☆22Apr 12, 2023Updated 3 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆43Sep 6, 2024Updated last year
- Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing revi…☆17Mar 3, 2024Updated 2 years ago
- Meticulously curated security notes with Emphasis on Application Security, DevSecOps, Cloud Computing, and Penetration Testing.☆138Apr 10, 2024Updated 2 years ago
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆115Feb 18, 2023Updated 3 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Training materials I've written.☆11Nov 11, 2025Updated 5 months ago
- gitbook of all pentesting knowledge☆21May 1, 2023Updated 3 years ago
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Scripts for OWASP-ZAP☆13Oct 7, 2025Updated 7 months ago
- Simple recon tool automates your recon process☆16Apr 15, 2023Updated 3 years ago
- A simple bash script for Web Cache Deception exploitation.☆16Oct 7, 2024Updated last year
- Mine URLs from Browser's Heap Snapshot for fun and profit☆65Aug 9, 2023Updated 2 years ago
- Enhanced 403 bypass header☆21Sep 12, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆20Jul 19, 2021Updated 4 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated 2 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆34Aug 28, 2023Updated 2 years ago
- Xorn is a versatile subdomain scanner tool written in Go.☆14Aug 29, 2024Updated last year
- Quickly find all identities someone has used on their Github commits☆16Jul 28, 2024Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆44Oct 15, 2022Updated 3 years ago
- Subdomains analysis and generation tool. Reveal the hidden!☆245Jun 8, 2025Updated 11 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Crowdstrike response script containing various functions for IR/triage☆12Dec 7, 2020Updated 5 years ago
- XSSMaze is a web service designed to test and improve the performance of security testing tools by providing various cases of XSS vulnera…☆32Updated this week
- Simple reverse shell to avoid Windows defender and kaspersky detection☆21Dec 20, 2021Updated 4 years ago
- ☆27Feb 28, 2023Updated 3 years ago
- Vulnerability Assessment and Penetration Testing Tools (Information Security / Cyber security)☆31Oct 26, 2022Updated 3 years ago
- a tool that compiles a csv of all h1 program stats☆49Jul 2, 2023Updated 2 years ago
- A simple bug bounty utility tool to remove uninteresting entries from a list of URLs.☆13Jul 22, 2024Updated last year