Edd13Mora / OrangeChakra
Osint French People Location
☆15Updated 2 years ago
Alternatives and similar repositories for OrangeChakra:
Users that are interested in OrangeChakra are comparing it to the libraries listed below
- ☆14Updated last year
- The Hack3r News B'darija☆18Updated 2 years ago
- A really good cybersec reading materials.☆13Updated 2 years ago
- Writeups of CTFs i play - this repository will also include POCs, RFCs and Related Resources to support the writeups.☆8Updated 2 years ago
- The Hacking Week☆2Updated 2 years ago
- SecDojo 23jan CTF writeup.☆13Updated 3 years ago
- some of my IOCs from malware investigations☆10Updated 2 years ago
- Open Redirect scanner☆18Updated 2 years ago
- CVE-2023-38831 winrar exploit generator and get reverse shell☆11Updated last year
- A Burp Suite extension that helps track and manage multiple sessions simultaneously by color-coding HTTP requests based on custom pattern…☆25Updated 4 months ago
- Vulnerabilities you my miss during a penetration testing.☆98Updated last year
- A project aimed at automating and making repetitive tasks easy while pentesting , like creating msf payloads or a one-liner reverse shel…☆11Updated 2 years ago
- XSS Bypass☆29Updated last year
- Another pentest of a vulnerable windows server☆16Updated 3 years ago
- ☆42Updated 2 years ago
- CTF Writeups☆60Updated 8 months ago
- CIT Cyber Security Cell Bootcamp Training modules☆37Updated 3 years ago
- This script reads a text file containing domains, fetches the subdomains from crt.sh☆10Updated last year
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆18Updated last year
- DarkSpy facilitates a secure and educational environment to comprehend the mechanics of establishing connections between two machines. Th…☆46Updated 8 months ago
- ☆30Updated 2 years ago
- Making your own CTF☆26Updated 4 years ago
- ☆42Updated last year
- Network Shredder IDS☆11Updated 7 months ago
- Mnemonic Cryptography☆17Updated 2 years ago
- ☆20Updated 11 months ago
- ☆28Updated 4 years ago
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆20Updated 2 years ago
- ☆13Updated 3 years ago
- ☆41Updated 3 years ago