Notes and Commands for CTFs
☆23Apr 28, 2020Updated 5 years ago
Alternatives and similar repositories for security
Users that are interested in security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Slack integration for MagicMirror²☆10Sep 9, 2020Updated 5 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Sep 18, 2019Updated 6 years ago
- ☆29May 14, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆18Aug 8, 2024Updated last year
- A curated list of resources related to Industrial Control System (ICS) security.☆21Aug 23, 2021Updated 4 years ago
- ☕ Manage and create a WiFi Hotspot with PowerShell 📶☆17Dec 25, 2023Updated 2 years ago
- Javascript payload that inject a malicious payload into the copy-buffer of the victim☆37May 25, 2018Updated 7 years ago
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆14Aug 8, 2024Updated last year
- adding a backdooruser using win32api☆80Sep 3, 2020Updated 5 years ago
- Using open Adb ports we can exploit a Andriod Device☆19Jun 30, 2019Updated 6 years ago
- Protect your computer / rooted-smartphone !☆19Apr 6, 2025Updated last year
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆16Nov 10, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆24Apr 16, 2019Updated 6 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- Record my learn path of HEAP EXPLOITATION on LINUX☆14Feb 2, 2018Updated 8 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Grab target's webcam shots by link☆20Oct 26, 2019Updated 6 years ago
- Ruby bindings for Augeas☆18Aug 7, 2024Updated last year
- private online storage for hackers☆16Sep 1, 2013Updated 12 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- Reverse Shell as a Service☆32Jul 6, 2020Updated 5 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated 3 months ago
- ☆12Sep 25, 2020Updated 5 years ago
- AES Ransomware in batch☆12Jun 25, 2024Updated last year
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Write docs in MDX☆12Jun 15, 2023Updated 2 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Script to Exploit Buffer_overflow (0)-Day vulnerability & executes the command remotely on target system.☆16Nov 7, 2020Updated 5 years ago
- Discord Scripts☆12Nov 30, 2019Updated 6 years ago
- Automated and Scalable Windows Deployment Tool☆13May 4, 2016Updated 9 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- ☆10Jan 8, 2018Updated 8 years ago
- Tool to manipulate and weaponize Office Open XML documents.☆71Mar 27, 2023Updated 3 years ago
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago