Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
☆14Aug 17, 2022Updated 3 years ago
Alternatives and similar repositories for KnowledgeBase
Users that are interested in KnowledgeBase are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Jun 20, 2022Updated 3 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Aug 16, 2024Updated last year
- A curated list of TryHackme (THM) and HackTheBox (HTB) resources, modules and rooms to be used with OSCP. The list is not complete and wi…☆36May 28, 2023Updated 2 years ago
- Automatically find certain gems in King of Thieves☆10May 15, 2025Updated 11 months ago
- CVE-2022-2586: Linux kernel nft_object UAF☆20Sep 3, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- ☆42Nov 15, 2025Updated 5 months ago
- Code for our 2023 IEEE S&P Paper "The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web"☆14Dec 12, 2024Updated last year
- Demonstrating the possibility of stealing the private data of Harvard students and professors <3☆11Dec 13, 2015Updated 10 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆15Nov 2, 2022Updated 3 years ago
- Brutteforce for stego CTFs☆17Nov 2, 2022Updated 3 years ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Jun 14, 2023Updated 2 years ago
- ☆11Oct 6, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Jun 20, 2022Updated 3 years ago
- Random scripts and files I use for Android reversing☆17Feb 19, 2013Updated 13 years ago
- Quickly find all identities someone has used on their Github commits☆16Jul 28, 2024Updated last year
- Heartbleed OpenSSL exploit☆14Apr 11, 2014Updated 12 years ago
- Contains all the required AWS Books, Code and materials for learning.☆19May 7, 2024Updated last year
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- 泛微E-Office文件上传漏洞(CNVD-2021-49104)☆10Nov 27, 2021Updated 4 years ago
- CLI tool for discovering related base domains using WhoisXMLAPI's reverse Whois endpoints☆12Jun 15, 2024Updated last year
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.☆17Oct 13, 2022Updated 3 years ago
- Weaponize.it is your go-to resource for gaining insights into pentesting, bug bounty hunting, and scripting.☆12Apr 3, 2025Updated last year
- ☆11Jan 29, 2026Updated 3 months ago
- ☆28Nov 4, 2020Updated 5 years ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 3 years ago
- A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell option…☆14Jun 27, 2023Updated 2 years ago
- Spongebob-themed cypher injection playground☆13Jun 4, 2023Updated 2 years ago
- An x86_64 Linux decompiler written in Python!☆14Jan 16, 2019Updated 7 years ago
- Utilities for working with Kony mobile applications.☆19Mar 29, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆12Jun 17, 2020Updated 5 years ago
- ThreadsApp is a web application built with a purpose of helping people learn web application security.☆17Nov 22, 2024Updated last year
- CISSP Certification Exam Prep☆21Dec 14, 2025Updated 4 months ago
- Wordpress 5.8.2 CVE-2022-21661 Vuln enviroment POC exploit☆14May 28, 2022Updated 3 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Mar 13, 2024Updated 2 years ago
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆18Mar 22, 2023Updated 3 years ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago