Knowledge is power
☆86Nov 23, 2017Updated 8 years ago
Alternatives and similar repositories for Dump
Users that are interested in Dump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Oct 29, 2014Updated 11 years ago
- ☆11Feb 20, 2015Updated 11 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 8 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆37Oct 7, 2019Updated 6 years ago
- Some Of MY TOOLS☆11Jul 4, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- My Personal Library for CTF's☆12Apr 3, 2018Updated 8 years ago
- Prometheus Firewall Analyzer☆48May 1, 2015Updated 11 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- For building TWRP for Samsung Note 5 GSM ONLY☆10Sep 22, 2017Updated 8 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆55Dec 4, 2022Updated 3 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Nov 3, 2014Updated 11 years ago
- ☆12Aug 12, 2016Updated 9 years ago
- Path bookmarking for bash. I use this extensively throughout my day.☆24Apr 22, 2020Updated 6 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Dec 18, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Some useful tools and scripts☆47Feb 11, 2023Updated 3 years ago
- Stækka Metasploit - Extenting Metasploit☆54Jul 7, 2017Updated 8 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- RDP POC☆19Jun 1, 2019Updated 6 years ago
- PERCEIVE is a project incubator inspired by Apache Incubator and Stack Exchange's Area 51. It serves as a staging zone repository for the…☆13May 21, 2018Updated 8 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 8 months ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- ☆23Jan 18, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11May 25, 2019Updated 6 years ago
- ☆24Nov 11, 2025Updated 6 months ago
- Tool development for monitoring packets in local networks.☆18Nov 7, 2016Updated 9 years ago
- SQL, IIS, Oh My...☆21Feb 24, 2025Updated last year
- ☆27Apr 16, 2017Updated 9 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- Create VCF file from exported Telegram data☆11May 21, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Support x86 and x64☆66Apr 17, 2021Updated 5 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19May 13, 2026Updated last week
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- S3 Buckets that will let you list all files inside them☆14Apr 26, 2018Updated 8 years ago
- My Submission for the OpenAI/NeurIPS ProcGen Competition☆10Nov 12, 2020Updated 5 years ago