优质安全 list
☆12Nov 22, 2017Updated 8 years ago
Alternatives and similar repositories for collection-Good-information-security-list
Users that are interested in collection-Good-information-security-list are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Mar 4, 2019Updated 7 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆13Oct 3, 2023Updated 2 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- ☆28Mar 26, 2020Updated 6 years ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- miscellaneous security research stuff☆37Jul 16, 2019Updated 6 years ago
- ElasticSearch vulnerable scanner☆16Oct 6, 2019Updated 6 years ago
- Collection of snippets for devtools.☆13Mar 17, 2021Updated 5 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆15Apr 13, 2021Updated 4 years ago
- ☆15Feb 5, 2022Updated 4 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- apache solr 5.x - 8.2.0 rce (with config api)☆11Oct 31, 2019Updated 6 years ago
- Pulse Secure VPN mitm Research - CVE-2020-8241, CVE-2020-8239☆24Nov 1, 2020Updated 5 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆12Aug 1, 2021Updated 4 years ago
- ☆32Sep 14, 2017Updated 8 years ago
- Some debug notes and exploit(not blind)☆39Jul 28, 2019Updated 6 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆25May 30, 2017Updated 8 years ago
- OutCHM就是可以生成一个CHM啦。☆14Nov 9, 2016Updated 9 years ago
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- PhishingExploit☆24Sep 3, 2018Updated 7 years ago
- ☆23Apr 8, 2015Updated 10 years ago
- Cobalt strike custom 404 page☆66Apr 5, 2020Updated 5 years ago
- Collect the EN name with the highest frequency of use -CN Name☆15Nov 7, 2017Updated 8 years ago
- BpArsenal, a Burp Suite plugin that can quickly convert http requests into command-line tool execution, launch third-party tools and open…☆22Oct 31, 2025Updated 4 months ago
- public exploits☆36May 11, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13May 18, 2018Updated 7 years ago
- 多线程网站目录穷举扫描修改版☆26Jun 17, 2016Updated 9 years ago
- Extension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.☆25Feb 10, 2022Updated 4 years ago
- CVE-2018-15982_PoC☆14Nov 6, 2019Updated 6 years ago
- setsid for macosx☆17Mar 13, 2015Updated 11 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago