Guidelines for writing secure code for Python developers.
☆22Apr 23, 2017Updated 8 years ago
Alternatives and similar repositories for hunter
Users that are interested in hunter are comparing it to the libraries listed below
Sorting:
- A static website template for security pages.☆54Jul 19, 2025Updated 8 months ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 4 years ago
- This version touches disk for registry persistence.☆27Oct 6, 2015Updated 10 years ago
- An OSINT tool to find contacts in order to report security vulnerabilities.☆268Jan 27, 2020Updated 6 years ago
- ☆10Jun 25, 2020Updated 5 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆166Nov 6, 2019Updated 6 years ago
- Obfuscated Invoke-Mimikatz☆52Oct 23, 2018Updated 7 years ago
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 7 years ago
- Attacks against weak 802.11 Random Number Generators☆25Feb 8, 2017Updated 9 years ago
- List all tracks of an artist ranked by poularity at http://localhost:3000/tracks/{artistName}☆10Sep 24, 2015Updated 10 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- Advices to look for malicious software on your devices☆18May 6, 2020Updated 5 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆74Dec 4, 2019Updated 6 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Nov 13, 2017Updated 8 years ago
- A simple tool to decloak/expose the bucket name behind a domain.☆22Feb 6, 2026Updated last month
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- We remember his diary, a static blogging tool.☆11Nov 20, 2021Updated 4 years ago
- Use normal web pentest tools to hack Websockets☆18Sep 23, 2019Updated 6 years ago
- ☆15Mar 21, 2025Updated 11 months ago
- [+]An Automation Tool Based on [ securitytrails.com ]☆17Jun 3, 2021Updated 4 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- Twitter analysis tools used by r0zetta☆19Apr 23, 2019Updated 6 years ago
- Purge plugin for DNF☆11Mar 8, 2026Updated last week
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- html5 port of earf (software terrain renderer)☆21Feb 21, 2014Updated 12 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Stratosphere uses password generation algorithms to discover publicly accessible cloud storage buckets.☆31Jul 15, 2021Updated 4 years ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆33Jan 23, 2022Updated 4 years ago
- DPE - Default Password Enumeration☆37Jun 3, 2013Updated 12 years ago
- The Bug Bounty Wiki☆173Oct 31, 2018Updated 7 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Linux Foundation Certified Engineer (LFCE) learning materials☆12Mar 6, 2022Updated 4 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆19May 20, 2020Updated 5 years ago
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- A linux based program that encrypts or decrypts a file☆12Jan 5, 2022Updated 4 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Pentesting resources☆23May 3, 2019Updated 6 years ago