Notes and Commands for CTFs
☆24Apr 28, 2020Updated 6 years ago
Alternatives and similar repositories for security
Users that are interested in security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Any code for preparing for OSCE☆12Oct 31, 2017Updated 8 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- Script to auto generate Python package info on requirements.txt☆11Jul 28, 2023Updated 2 years ago
- ☆29May 14, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 4 months ago
- ☕ Manage and create a WiFi Hotspot with PowerShell 📶☆17Dec 25, 2023Updated 2 years ago
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆14Aug 8, 2024Updated last year
- adding a backdooruser using win32api☆80Sep 3, 2020Updated 5 years ago
- ☆17Mar 22, 2026Updated last month
- The autoexpect of pwntools☆18Feb 10, 2019Updated 7 years ago
- Using open Adb ports we can exploit a Andriod Device☆19Jun 30, 2019Updated 6 years ago
- Protect your computer / rooted-smartphone !☆19Apr 6, 2025Updated last year
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆16Nov 10, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆24Apr 16, 2019Updated 7 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- Record my learn path of HEAP EXPLOITATION on LINUX☆14Feb 2, 2018Updated 8 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated 2 years ago
- Instantly search the web for hacked data. Check if you appear in any database leaks.☆15Nov 22, 2018Updated 7 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Grab target's webcam shots by link☆20Oct 26, 2019Updated 6 years ago
- Ruby bindings for Augeas☆18Aug 7, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- [Phishing Tool]☆17Jul 18, 2025Updated 9 months ago
- private online storage for hackers☆16Sep 1, 2013Updated 12 years ago
- Get Group Policy information from ADMX files.☆11Jan 22, 2021Updated 5 years ago
- ☆12Aug 26, 2022Updated 3 years ago
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆18Feb 10, 2022Updated 4 years ago
- ☆12Sep 25, 2020Updated 5 years ago
- AES Ransomware in batch☆12Jun 25, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Creates a new bucket in Google cloud storage service (GCS). Once a bucket has been created, its location can't be changed.☆11Dec 1, 2022Updated 3 years ago
- A dashboard for quickly seeing where your colleagues are (in the office, working from elsewhere or on holiday). Works with the WFH API an…☆11Nov 17, 2015Updated 10 years ago
- Webmin module for managing Netatalk [DEPRECATED: code merged into netatalk repo]☆12Sep 24, 2024Updated last year
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- Virtual Master runs another Android System on your device, based on our Android on Android Virtualization Technology.☆17May 11, 2023Updated 2 years ago