dotfiles
☆19Feb 18, 2025Updated last year
Alternatives and similar repositories for dotfiles
Users that are interested in dotfiles are comparing it to the libraries listed below
Sorting:
- DNS hijacking via dead records automation tool☆53Jan 8, 2021Updated 5 years ago
- ☆13Jul 29, 2024Updated last year
- ☆11Jun 20, 2021Updated 4 years ago
- ☆21Jan 14, 2022Updated 4 years ago
- Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.☆102Dec 26, 2021Updated 4 years ago
- ☆12Nov 3, 2020Updated 5 years ago
- Challenge 1 of The Auror Project - Setup AD Lab automatically☆12Apr 26, 2022Updated 3 years ago
- LFI to RCE tool.☆15May 10, 2020Updated 5 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- My experiences with Virtual Hacking Labs☆12Feb 7, 2020Updated 6 years ago
- ☆29May 11, 2025Updated 10 months ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆147Jan 23, 2021Updated 5 years ago
- English translation of Cyberhub CTF guidebook + add-ons☆18Jul 10, 2020Updated 5 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15May 22, 2023Updated 2 years ago
- A tool for making python source difficult to read.☆16Sep 7, 2024Updated last year
- GraphQL automatic fuzzing tool☆16Jul 16, 2021Updated 4 years ago
- installs minimal arch linux. But you have to do disk partitioning via fdisk☆13Mar 2, 2023Updated 3 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- A Python based GUI for volatility. Made by keeping CTFs in focus. Basic memory forensics in Clicks.☆48Jun 5, 2022Updated 3 years ago
- Demonstrating the possibility of stealing the private data of Harvard students and professors <3☆11Dec 13, 2015Updated 10 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆16Nov 2, 2022Updated 3 years ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial f…☆20Jun 1, 2024Updated last year
- These are payloads to hunt for various bugs in web applications. from SQLi, xss, RCE to path traversal and more with XSS and fuzzing.☆11Oct 3, 2020Updated 5 years ago
- ☆12Apr 14, 2021Updated 4 years ago
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Jun 20, 2022Updated 3 years ago
- DNS and Target HTTP History Local Storage and Search☆63Feb 14, 2021Updated 5 years ago
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 8 years ago
- Cloud-native distributed key-value database.☆10Mar 7, 2026Updated 2 weeks ago
- CTFs as you need them☆30May 3, 2023Updated 2 years ago
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 5 years ago
- Automates searching Shodan for vulnerable systems in your neighborhood.☆12Jul 16, 2020Updated 5 years ago
- [+]An Automation Tool Based on [ securitytrails.com ]☆17Jun 3, 2021Updated 4 years ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 2 years ago
- PyIntruder: A Python fuzzer boasting multithreading for accelerated performance, a user-friendly tkinter GUI interface, and a wide array …☆56Nov 18, 2021Updated 4 years ago
- A tool to discover ASN of any host and fetch IP ranges.☆25May 18, 2020Updated 5 years ago
- Some handy script to collect hosts installed redis (using Shodan search engine) and exploit them☆18Aug 20, 2016Updated 9 years ago
- A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell option…☆14Jun 27, 2023Updated 2 years ago
- Pentest tool. Conviniently invoke RCE on many PostgreSQL servers in network☆16Jan 14, 2019Updated 7 years ago