Notes and Commands for CTFs
☆22Apr 28, 2020Updated 5 years ago
Alternatives and similar repositories for security
Users that are interested in security are comparing it to the libraries listed below
Sorting:
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Slack integration for MagicMirror²☆10Sep 9, 2020Updated 5 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Sep 18, 2019Updated 6 years ago
- Script to auto generate Python package info on requirements.txt☆11Jul 28, 2023Updated 2 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Aug 23, 2021Updated 4 years ago
- Application Security Mind Maps☆11Apr 10, 2021Updated 4 years ago
- https://github.com/OlivierLaflamme/Cheatsheet-God☆18Jul 10, 2021Updated 4 years ago
- DDoS Attack - Script Python 2☆14May 12, 2018Updated 7 years ago
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆14Aug 8, 2024Updated last year
- adding a backdooruser using win32api☆80Sep 3, 2020Updated 5 years ago
- The autoexpect of pwntools☆18Feb 10, 2019Updated 7 years ago
- notes on applied computer security☆12Jun 27, 2023Updated 2 years ago
- ☆13Jun 15, 2023Updated 2 years ago
- Protect your computer / rooted-smartphone !☆19Apr 6, 2025Updated 11 months ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆16Nov 10, 2020Updated 5 years ago
- ☆24Apr 16, 2019Updated 6 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- Record my learn path of HEAP EXPLOITATION on LINUX☆14Feb 2, 2018Updated 8 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Instantly search the web for hacked data. Check if you appear in any database leaks.☆15Nov 22, 2018Updated 7 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- Grab target's webcam shots by link☆20Oct 26, 2019Updated 6 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- [Phishing Tool]☆17Jul 18, 2025Updated 8 months ago
- Fluxion is the future of MITM WPA attacks Fluxion is a security auditing and social-engineering research tool. It is a remake of linset …☆16Oct 1, 2020Updated 5 years ago
- Scapy 802.1X exploitation framework.☆20Mar 2, 2021Updated 5 years ago
- Open Penetration Testing Bookmarks Collection☆19Jun 9, 2015Updated 10 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- ☆12Aug 26, 2022Updated 3 years ago
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- Fuzzy test rules (include Sqli xss Lfi and so on)☆17Nov 7, 2017Updated 8 years ago
- ☆12Sep 25, 2020Updated 5 years ago
- SVG, XML, GIF and PDF files that result in finding XSS reports on websites : The payloads are available for testing purpose only.☆15Apr 17, 2023Updated 2 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Creates a new bucket in Google cloud storage service (GCS). Once a bucket has been created, its location can't be changed.☆11Dec 1, 2022Updated 3 years ago
- Discord Scripts☆12Nov 30, 2019Updated 6 years ago
- Script to Exploit Buffer_overflow (0)-Day vulnerability & executes the command remotely on target system.☆16Nov 7, 2020Updated 5 years ago
- Automated and Scalable Windows Deployment Tool☆13May 4, 2016Updated 9 years ago