Single stop for security related stuff
☆58Nov 20, 2016Updated 9 years ago
Alternatives and similar repositories for Security-Bookmarks
Users that are interested in Security-Bookmarks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A copy of articles published at Peerlyst☆43Oct 30, 2016Updated 9 years ago
- Documentation featuring how to revoke API keys of different websites☆55Oct 29, 2016Updated 9 years ago
- ☆42Jul 3, 2016Updated 9 years ago
- A collection of various hacking and exploitation tools for hackers and pentesters.☆182Aug 4, 2016Updated 9 years ago
- Badges for your GitHub tool presented at InfoSec Conference☆129Mar 12, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Powerful plugins and add-ons for hackers☆894Dec 10, 2023Updated 2 years ago
- A collection of various GitHub gists for hackers, pentesters and security researchers☆967Nov 4, 2017Updated 8 years ago
- Awesome tools to exploit Windows !☆1,766May 21, 2022Updated 3 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- Create your own Instagram feed without being registered with Instagram☆15Nov 15, 2022Updated 3 years ago
- WebApp for BugBounty Hunters☆14Mar 24, 2017Updated 9 years ago
- ☆13Dec 14, 2021Updated 4 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆13Nov 23, 2016Updated 9 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆13Jul 15, 2018Updated 7 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Mod Installer for the PC version of Gorilla Tag.☆24Mar 12, 2021Updated 5 years ago
- SApCap is a SAP packet sniffer and decompression tool for analysing SAP GUI (DIAG) traffic☆17Apr 20, 2017Updated 9 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Threat Research Blog 威胁情报提取与溯源技术研究小组☆31May 2, 2018Updated 8 years ago
- Proof of Concepts, Exploits☆28Apr 8, 2025Updated last year
- IOT Research Blog 物联网安全技术研究小组☆52Jun 20, 2018Updated 7 years ago
- Automated Phishing Tool☆10Apr 5, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Automated Pentest Recon Scanner☆14Oct 6, 2017Updated 8 years ago
- Lazy Hacker Editor. Because nothing beats the eficiency of writing code already written. This is that kind of editor. Just for real hacke…☆10Dec 28, 2024Updated last year
- A Java JAXB library for generating events conforming to the Event Logging XML Schema☆16Aug 5, 2024Updated last year
- This repository contains the files that provide the upload functionality in the IIS Server☆36Aug 4, 2021Updated 4 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 9 years ago
- A simple Python tool to harvest email addresses from Google.☆17Jan 8, 2015Updated 11 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆15Sep 9, 2012Updated 13 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Aug 5, 2022Updated 3 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Honeypot Research Blog 蜜罐技术研究小组☆95Jun 10, 2018Updated 7 years ago
- ☆12Jan 5, 2023Updated 3 years ago
- The Biggest SKINBASE Repos of the World.☆13Apr 15, 2024Updated 2 years ago
- Collection of information security policies.☆29Apr 20, 2017Updated 9 years ago
- .NET Reverse Shell☆16Sep 24, 2016Updated 9 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago