This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific topic.
☆17Feb 10, 2022Updated 4 years ago
Alternatives and similar repositories for Mindmaps
Users that are interested in Mindmaps are comparing it to the libraries listed below
Sorting:
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated last year
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated last month
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- ☆16Oct 18, 2024Updated last year
- Custom Binary Ninja Themes☆12Nov 11, 2023Updated 2 years ago
- ☆15Oct 11, 2023Updated 2 years ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- 1000 black hat tools Collected From github☆16Nov 28, 2019Updated 6 years ago
- ☆19Mar 4, 2023Updated 2 years ago
- A Lightning-Fast DNS Resolver written in Rust 🦀☆69Nov 19, 2024Updated last year
- hackxpert labs☆18Jun 29, 2022Updated 3 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- ☆20May 18, 2022Updated 3 years ago
- Challenge Python☆19Apr 26, 2023Updated 2 years ago
- ☆20Jan 9, 2024Updated 2 years ago
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆87Apr 4, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- ☆24Nov 3, 2022Updated 3 years ago
- 📚A curated list of product security resources.☆23Jun 11, 2025Updated 8 months ago
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- ☆19Sep 24, 2025Updated 5 months ago
- Everything you need to prepare for the Microsoft 365 Certified: Endpoint Administrator Associate!☆26Dec 16, 2023Updated 2 years ago
- An example Obsidian Vault☆10Apr 8, 2024Updated last year
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Nov 24, 2025Updated 3 months ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago