Notes and Commands for CTFs
☆25Apr 28, 2020Updated 6 years ago
Alternatives and similar repositories for security
Users that are interested in security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Any code for preparing for OSCE☆12Oct 31, 2017Updated 8 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Slack integration for MagicMirror²☆10Sep 9, 2020Updated 5 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Sep 18, 2019Updated 6 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Script to auto generate Python package info on requirements.txt☆11Jul 28, 2023Updated 2 years ago
- ☆29May 14, 2019Updated 7 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆21Mar 6, 2019Updated 7 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆22Aug 23, 2021Updated 4 years ago
- DDoS Attack - Script Python 2☆14May 12, 2018Updated 8 years ago
- ☕ Manage and create a WiFi Hotspot with PowerShell 📶☆17Dec 25, 2023Updated 2 years ago
- Javascript payload that inject a malicious payload into the copy-buffer of the victim☆37May 25, 2018Updated 7 years ago
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆14Aug 8, 2024Updated last year
- adding a backdooruser using win32api☆80Sep 3, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The autoexpect of pwntools☆18Feb 10, 2019Updated 7 years ago
- Using open Adb ports we can exploit a Andriod Device☆19Jun 30, 2019Updated 6 years ago
- Protect your computer / rooted-smartphone !☆19Apr 6, 2025Updated last year
- ☆24Apr 16, 2019Updated 7 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- Record my learn path of HEAP EXPLOITATION on LINUX☆14Feb 2, 2018Updated 8 years ago
- Instantly search the web for hacked data. Check if you appear in any database leaks.☆15Nov 22, 2018Updated 7 years ago
- Grab target's webcam shots by link☆20Oct 26, 2019Updated 6 years ago
- Ruby bindings for Augeas☆18Aug 7, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Fluxion is the future of MITM WPA attacks Fluxion is a security auditing and social-engineering research tool. It is a remake of linset …☆16Oct 1, 2020Updated 5 years ago
- Scapy 802.1X exploitation framework.☆20Mar 2, 2021Updated 5 years ago
- private online storage for hackers☆16Sep 1, 2013Updated 12 years ago
- Get Group Policy information from ADMX files.☆11Jan 22, 2021Updated 5 years ago
- ☆12Aug 26, 2022Updated 3 years ago
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- Fuzzy test rules (include Sqli xss Lfi and so on)☆17Nov 7, 2017Updated 8 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆18Feb 10, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Open Penetration Testing Bookmarks Collection☆20Jun 9, 2015Updated 10 years ago
- AES Ransomware in batch☆12Jun 25, 2024Updated last year
- Creates a new bucket in Google cloud storage service (GCS). Once a bucket has been created, its location can't be changed.☆11Dec 1, 2022Updated 3 years ago
- Script to Exploit Buffer_overflow (0)-Day vulnerability & executes the command remotely on target system.☆16Nov 7, 2020Updated 5 years ago
- Automated and Scalable Windows Deployment Tool☆13May 4, 2016Updated 10 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- Tool to manipulate and weaponize Office Open XML documents.☆72Mar 27, 2023Updated 3 years ago