This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific topic.
☆17Feb 10, 2022Updated 4 years ago
Alternatives and similar repositories for Mindmaps
Users that are interested in Mindmaps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Training for Golang (go language)☆10Mar 29, 2019Updated 7 years ago
- ☆18Mar 26, 2024Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Only for educational purposes☆11Jun 17, 2023Updated 2 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 4 months ago
- Custom Binary Ninja Themes☆12Nov 11, 2023Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆19Mar 4, 2023Updated 3 years ago
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- ☆24Nov 3, 2022Updated 3 years ago
- ☆15Oct 18, 2024Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆37Dec 4, 2025Updated 5 months ago
- ☆20May 18, 2022Updated 4 years ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆88Apr 4, 2024Updated 2 years ago
- Manage attack surface data on Elasticsearch☆26Nov 20, 2023Updated 2 years ago
- Challenge Python☆19Apr 26, 2023Updated 3 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday prog…☆10May 19, 2023Updated 3 years ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated 2 years ago
- 1000 black hat tools Collected From github☆17Nov 28, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- A list of temporary email providers☆12Mar 30, 2019Updated 7 years ago
- 📚A curated list of product security resources.☆23Jun 11, 2025Updated 11 months ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- OmniCrawl is a web measurement tool that allows for recording of web requests and JavaScript browser API accesses on multiple platforms.☆27Mar 20, 2024Updated 2 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago