Single stop for security related stuff
☆58Nov 20, 2016Updated 9 years ago
Alternatives and similar repositories for Security-Bookmarks
Users that are interested in Security-Bookmarks are comparing it to the libraries listed below
Sorting:
- A copy of articles published at Peerlyst☆43Oct 30, 2016Updated 9 years ago
- Documentation featuring how to revoke API keys of different websites☆55Oct 29, 2016Updated 9 years ago
- ☆42Jul 3, 2016Updated 9 years ago
- A collection of various hacking and exploitation tools for hackers and pentesters.☆177Aug 4, 2016Updated 9 years ago
- Badges for your GitHub tool presented at InfoSec Conference☆129Mar 12, 2020Updated 5 years ago
- Powerful plugins and add-ons for hackers☆884Dec 10, 2023Updated 2 years ago
- A collection of various GitHub gists for hackers, pentesters and security researchers☆957Nov 4, 2017Updated 8 years ago
- Awesome tools to exploit Windows !☆1,742May 21, 2022Updated 3 years ago
- Create your own Instagram feed without being registered with Instagram☆15Nov 15, 2022Updated 3 years ago
- Free Security and Hacking eBooks☆4,792Jul 10, 2019Updated 6 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- Lazy Hacker Editor. Because nothing beats the eficiency of writing code already written. This is that kind of editor. Just for real hacke…☆10Dec 28, 2024Updated last year
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- GitHub data provider for hacknical & jarvim☆10Aug 10, 2025Updated 6 months ago
- sniff inputs type☆10Aug 3, 2017Updated 8 years ago
- ☆12Jul 15, 2018Updated 7 years ago
- Proof of Concepts, Exploits☆28Apr 8, 2025Updated 10 months ago
- Security Tools written in Golang☆12Sep 2, 2020Updated 5 years ago
- A repository containing every transparency report of the Invidious project.☆16Oct 31, 2022Updated 3 years ago
- 用于扫描git,svn泄露☆11Jul 29, 2015Updated 10 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- Mod Installer for the PC version of Gorilla Tag.☆18Mar 12, 2021Updated 4 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Personal Troller is a C# console application to torment your friends' work day.☆10Dec 31, 2017Updated 8 years ago
- WebApp for BugBounty Hunters☆14Mar 24, 2017Updated 8 years ago
- Service desk password tools.☆16Apr 21, 2017Updated 8 years ago
- 😈 Prank your friends with fake phone operating screens! (PWA support)☆12Jan 6, 2021Updated 5 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆16Aug 6, 2020Updated 5 years ago
- A Java JAXB library for generating events conforming to the Event Logging XML Schema☆16Aug 5, 2024Updated last year
- .NET Reverse Shell☆16Sep 24, 2016Updated 9 years ago
- Instantly jams the browser windows☆10Feb 20, 2025Updated last year
- SApCap is a SAP packet sniffer and decompression tool for analysing SAP GUI (DIAG) traffic☆17Apr 20, 2017Updated 8 years ago
- A set of D3 data visualisations for use in Stroom dashboards or other applications☆14Nov 4, 2025Updated 4 months ago
- Automated Pentest Recon Scanner☆14Oct 6, 2017Updated 8 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Mar 19, 2016Updated 9 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Jun 21, 2017Updated 8 years ago