DictionaryHouse / collection-Good-information-security-listView external linksLinks
优质安全 list
☆12Nov 22, 2017Updated 8 years ago
Alternatives and similar repositories for collection-Good-information-security-list
Users that are interested in collection-Good-information-security-list are comparing it to the libraries listed below
Sorting:
- ☆16Mar 4, 2019Updated 6 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- A small pentesting lab for Azure☆11Apr 19, 2019Updated 6 years ago
- Collection of snippets for devtools.☆13Mar 17, 2021Updated 4 years ago
- apache solr 5.x - 8.2.0 rce (with config api)☆11Oct 31, 2019Updated 6 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- ElasticSearch vulnerable scanner☆16Oct 6, 2019Updated 6 years ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆12Aug 1, 2021Updated 4 years ago
- ☆13Oct 3, 2023Updated 2 years ago
- 多线程网站目录穷举扫描修改版☆26Jun 17, 2016Updated 9 years ago
- OutCHM就是可以生成一个CHM啦。☆14Nov 9, 2016Updated 9 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- 收集国内外开源CMS存在漏洞的各种版本☆29Aug 14, 2018Updated 7 years ago
- ☆32Sep 14, 2017Updated 8 years ago
- CVE-2018-15982_PoC☆14Nov 6, 2019Updated 6 years ago
- My gfPatterns☆15Aug 31, 2021Updated 4 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13May 18, 2018Updated 7 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- setsid for macosx☆17Mar 13, 2015Updated 10 years ago
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- Cobalt strike custom 404 page☆66Apr 5, 2020Updated 5 years ago
- beacon,aggressor-scripts,cna,cobalt-strike,email☆36Jun 18, 2019Updated 6 years ago
- miscellaneous security research stuff☆37Jul 16, 2019Updated 6 years ago
- public exploits☆35May 11, 2023Updated 2 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- A collection of GitHub dorks for bug bounty hunters☆18Jun 24, 2022Updated 3 years ago
- A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)☆16Aug 29, 2018Updated 7 years ago
- 黑苹果运行在Vmware虚拟机中☆18Oct 8, 2018Updated 7 years ago
- Insecure Deserialization, PDF and lab☆18Nov 19, 2019Updated 6 years ago
- Bug Bounty Program Discovery tool, that discovers bug Bounty Program via security.txt file by default and you can use custom dork☆16Jul 17, 2022Updated 3 years ago
- Some debug notes and exploit(not blind)☆39Jul 28, 2019Updated 6 years ago
- Collect the EN name with the highest frequency of use -CN Name☆15Nov 7, 2017Updated 8 years ago
- Pulse Secure VPN mitm Research - CVE-2020-8241, CVE-2020-8239☆24Nov 1, 2020Updated 5 years ago
- ☆23Apr 8, 2015Updated 10 years ago
- C# DCOM Execution☆18Aug 4, 2019Updated 6 years ago
- Automated Recon Tool Installer☆15Jun 29, 2022Updated 3 years ago