Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
β76Feb 25, 2026Updated last week
Alternatives and similar repositories for Archive
Users that are interested in Archive are comparing it to the libraries listed below
Sorting:
- π π΅οΈ Arch-Osint Linux OS VM based on Blackarch.β25Sep 8, 2023Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, β¦β35Dec 13, 2023Updated 2 years ago
- β17Dec 31, 2021Updated 4 years ago
- Looks for parameters in urlsβ34Oct 14, 2024Updated last year
- β22Apr 12, 2023Updated 2 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.β10Apr 8, 2024Updated last year
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intresβ¦β10Dec 25, 2020Updated 5 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bountyβ41Sep 6, 2024Updated last year
- gitbook of all pentesting knowledgeβ21May 1, 2023Updated 2 years ago
- β40Jul 24, 2022Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, β¦β25Jun 11, 2025Updated 8 months ago
- Training materials I've written.β11Nov 11, 2025Updated 3 months ago
- A PE morphing tool that allows you to mimic one executable file to another.β11Dec 6, 2023Updated 2 years ago
- β12Apr 17, 2022Updated 3 years ago
- Random Tips and Writeups.β15Feb 21, 2019Updated 7 years ago
- SAPLAR - LFI & Path Traversal Scannerβ15Mar 11, 2025Updated 11 months ago
- Recon tool for URLs discoveryβ12Jun 19, 2024Updated last year
- Fast scanner for exposed env filesβ14Nov 14, 2022Updated 3 years ago
- My entire hacker toolkit ready for to run on a vanilla Arch Linux installation.β26Apr 10, 2023Updated 2 years ago
- Enhanced 403 bypass headerβ21Sep 12, 2022Updated 3 years ago
- β80Jan 30, 2026Updated last month
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlaneβ14Mar 24, 2023Updated 2 years ago
- π Collection of regexp pattern for security passive scanningβ116Feb 18, 2023Updated 3 years ago
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaperβ17Sep 15, 2023Updated 2 years ago
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.β29Nov 7, 2023Updated 2 years ago
- Our plan is to improve cybersecurity posture through risk assessment, goal-setting, resource allocation, KPI monitoring, and ongoing reviβ¦β15Mar 3, 2024Updated 2 years ago
- experimental wildcard subdomain filtering prototypeβ16Aug 5, 2023Updated 2 years ago
- A simple BOF that disables some logging with NtSetInformationProcessβ13Oct 13, 2023Updated 2 years ago
- Quickly find all identities someone has used on their Github commitsβ17Jul 28, 2024Updated last year
- Reconnaisance Toolβ12Jun 4, 2020Updated 5 years ago
- Streamline Your Docker Deployments with One Commandβ17Feb 23, 2026Updated last week
- Loads and runs Linux RISC-V .elf files on Linux, MacOS, and Windows.β16Updated this week
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.β109Mar 1, 2022Updated 4 years ago
- My useful files for penetration tests, security assessments, bug bounty and other security related stuffβ198Updated this week
- Mine URLs from Browser's Heap Snapshot for fun and profitβ64Aug 9, 2023Updated 2 years ago
- A program for collecting subdomains of a list of given second-level domains (SLD)β15Feb 10, 2026Updated 3 weeks ago
- A simple bash script for Web Cache Deception exploitation.β16Oct 7, 2024Updated last year
- Simple recon tool automates your recon processβ16Apr 15, 2023Updated 2 years ago
- πΆ A curated list of Web Security materials and resources. With repository starsβ and forksπ΄β19Updated this week