AYAN-AMBESH / Ambarsariya
☆16Updated 2 years ago
Alternatives and similar repositories for Ambarsariya:
Users that are interested in Ambarsariya are comparing it to the libraries listed below
- An advanced cryptography tool for hashing, encrypting, encoding, steganography and more.☆17Updated 3 years ago
- Mutant is an open-source, garbage-collected programming language that tries to enable security by default.☆54Updated 4 months ago
- Get top quality resources from this repo. (Beginner Specific)☆14Updated last year
- Challenge files☆11Updated 3 years ago
- PyIntruder: A Python fuzzer boasting multithreading for accelerated performance, a user-friendly tkinter GUI interface, and a wide array …☆55Updated 3 years ago
- Here's the cheat sheet I created for the EJPT exam.☆11Updated 3 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Updated 2 years ago
- A Project where I try to learn something new every day, and this is a place to track it☆17Updated 3 years ago
- A miscellany of thoughts.☆43Updated 10 months ago
- Website that lets you:- • Generate strong new passwords • Check the strength of your password and • Find the time it would take a hacker …☆11Updated 2 years ago
- ReGen is a utility tool simplifying Regex creation by selecting values from logs or text. It enhances efficiency for digital forensics, d…☆21Updated last year
- Keylogger for Linux made in Python☆6Updated 2 years ago
- ☆15Updated last year
- Recon tool in Bash☆8Updated last year
- Tool to hack Graphql☆13Updated last year
- This repository is about Learn | Hack | Share | Repeat.☆11Updated 2 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆12Updated 4 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15Updated last month
- golang implementation of fonetic (https://github.com/s0md3v/fonetic)☆37Updated 2 years ago
- ☆10Updated last year
- ☆21Updated 7 years ago
- ☆10Updated last year
- ☆48Updated 4 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆11Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated 10 months ago
- Workflow for pentesting web applications.☆21Updated 5 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated last month
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- Tests your API automatically for common API vulnerabilities. Project is still Work In Progress. PRs are appreciated.☆33Updated 9 months ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 5 months ago