A mobile android app designed for e-commerce purposes. This app is compatible with Android API 24 "Nougat" and above.
☆22Jul 17, 2025Updated 8 months ago
Alternatives and similar repositories for Online-Ordering-System
Users that are interested in Online-Ordering-System are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated last month
- For my Try Hack Me room: Intro To Pwntools☆34Jun 10, 2021Updated 4 years ago
- Interactive XSS Labs to get into Client-Side Hacking☆84Feb 25, 2026Updated last month
- Python tool that generates an Xmind map with all the information gathered and any evidence of possible vulnerabilities identified via sta…☆31Nov 12, 2021Updated 4 years ago
- Security scanner for AI-generated ("vibe-coded") code. Runs SAST, DAST, and sandboxed exploit simulation across 15+ languages using …☆48Mar 28, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 用于练手的环境检测的demo☆92Jan 3, 2024Updated 2 years ago
- This repository contains resources and materials for courses and presentations related to AI Agents and Agentic Systems for Cybersecurity…☆172Apr 8, 2026Updated last week
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆132Mar 3, 2026Updated last month
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆225Mar 16, 2024Updated 2 years ago
- jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic using the CLI tool jsluice☆294Apr 9, 2024Updated 2 years ago
- A command and control framework written in rust.☆386Sep 4, 2025Updated 7 months ago
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆371Jul 24, 2023Updated 2 years ago
- Is a protect Android App anti any attacks and environments.☆357Dec 28, 2023Updated 2 years ago
- AI-powered ffuf wrapper☆722Dec 4, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆796Apr 2, 2026Updated 2 weeks ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆753Dec 19, 2023Updated 2 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆1,069Mar 24, 2026Updated 3 weeks ago
- The repo contains a series of challenges for learning Frida for Android Exploitation.☆1,251Feb 22, 2026Updated last month
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,326Apr 8, 2026Updated last week
- Quick SQLMap Tamper Suggester☆1,400Jul 18, 2022Updated 3 years ago
- XSS payloads designed to turn alert(1) into P1☆1,394Sep 12, 2023Updated 2 years ago
- Burp extension to evade TLS fingerprinting. Bypass WAF, spoof any browser.☆1,786Apr 7, 2026Updated last week
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,513Nov 21, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Zero shot vulnerability discovery using LLMs☆2,619Feb 6, 2025Updated last year
- Tool for Active Directory Certificate Services enumeration and abuse☆3,465Feb 28, 2026Updated last month
- Automation for internal Windows Penetrationtest / AD-Security☆3,653Aug 28, 2025Updated 7 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,581Mar 14, 2026Updated last month
- A tool to generate your GitHub summary card for profile README☆3,444Updated this week
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,367May 21, 2025Updated 10 months ago
- Web Attack Cheat Sheet☆4,417Apr 5, 2026Updated last week
- Google CTF☆4,931Feb 11, 2026Updated 2 months ago
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆5,578Mar 7, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 🟩⬜ Generates a snake game from a github user contributions graph and output a screen capture as animated svg or gif☆5,737Updated this week
- CTFs as you need them☆6,612Updated this week
- Tools and Techniques for Red Team / Penetration Testing☆8,641Mar 18, 2025Updated last year
- 🔥 Stay motivated and show off your contribution streak! 🌟 Display your total contributions, current streak, and longest streak on your …☆6,742Updated this week
- The recursive internet scanner for hackers. 🧡☆9,602Updated this week
- Ollama Python library☆9,796Jan 23, 2026Updated 2 months ago
- Automated Penetration Testing Agentic Framework Powered by Large Language Models☆12,547Feb 23, 2026Updated last month