Single stop for security related stuff
☆58Nov 20, 2016Updated 9 years ago
Alternatives and similar repositories for Security-Bookmarks
Users that are interested in Security-Bookmarks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A copy of articles published at Peerlyst☆43Oct 30, 2016Updated 9 years ago
- Documentation featuring how to revoke API keys of different websites☆55Oct 29, 2016Updated 9 years ago
- ☆42Jul 3, 2016Updated 9 years ago
- A collection of various hacking and exploitation tools for hackers and pentesters.☆177Aug 4, 2016Updated 9 years ago
- Badges for your GitHub tool presented at InfoSec Conference☆131Mar 12, 2020Updated 6 years ago
- Powerful plugins and add-ons for hackers☆889Dec 10, 2023Updated 2 years ago
- A collection of various GitHub gists for hackers, pentesters and security researchers☆963Nov 4, 2017Updated 8 years ago
- Awesome tools to exploit Windows !☆1,752May 21, 2022Updated 3 years ago
- Free Security and Hacking eBooks☆4,813Jul 10, 2019Updated 6 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- sniff inputs type☆10Aug 3, 2017Updated 8 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- Create your own Instagram feed without being registered with Instagram☆16Nov 15, 2022Updated 3 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- WebApp for BugBounty Hunters☆14Mar 24, 2017Updated 9 years ago
- Service desk password tools.☆16Apr 21, 2017Updated 8 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆13Nov 23, 2016Updated 9 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- SApCap is a SAP packet sniffer and decompression tool for analysing SAP GUI (DIAG) traffic☆17Apr 20, 2017Updated 8 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Proof of Concepts, Exploits☆28Apr 8, 2025Updated 11 months ago
- 用于扫描git,svn泄露☆11Jul 29, 2015Updated 10 years ago
- IOT Research Blog 物联网安全技术研究小组☆51Jun 20, 2018Updated 7 years ago
- ☆15Nov 22, 2023Updated 2 years ago
- Automated Pentest Recon Scanner☆14Oct 6, 2017Updated 8 years ago
- Lazy Hacker Editor. Because nothing beats the eficiency of writing code already written. This is that kind of editor. Just for real hacke…☆10Dec 28, 2024Updated last year
- Personal blog about cyber security and challenges☆20Updated this week
- A Java JAXB library for generating events conforming to the Event Logging XML Schema☆16Aug 5, 2024Updated last year
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- This is a backdoor about discover network device ,and it can hidden reverse connecting the hacker's server with encrypt commuication 后门扫描…☆14Aug 29, 2015Updated 10 years ago
- A simple Python tool to harvest email addresses from Google.☆17Jan 8, 2015Updated 11 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- Honeypot Research Blog 蜜罐技术研究小组☆95Jun 10, 2018Updated 7 years ago
- Collection of information security policies.☆29Apr 20, 2017Updated 8 years ago
- .NET Reverse Shell☆16Sep 24, 2016Updated 9 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago