This project is used for classification of SMS and Email spam.It has a full dashboard with login system connected to Mongo DB
☆15Apr 21, 2023Updated 2 years ago
Alternatives and similar repositories for Project_X-CyberSecurityInitiative
Users that are interested in Project_X-CyberSecurityInitiative are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Burp Suite Extension to monitor new scope☆16Mar 31, 2021Updated 5 years ago
- Cloud Discovery - brute force public AWS, GCP, Alibaba, and Azure cloud services☆24Jan 21, 2021Updated 5 years ago
- University project: Smart security camera on raspberry pi with email notifications and web interface☆36Dec 11, 2019Updated 6 years ago
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆53Jul 1, 2024Updated last year
- Botnet targeting Windows machines 🐍☆48Feb 25, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- OSCP Exam Report Template in Markdown☆34Oct 25, 2021Updated 4 years ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Small Projects on Socket Programming, Website Scanning, Wireless & Network Security☆72Jun 25, 2019Updated 6 years ago
- Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648☆12Jan 14, 2022Updated 4 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆11May 15, 2020Updated 5 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 4 years ago
- ☆57Sep 27, 2022Updated 3 years ago
- ☆13Sep 8, 2024Updated last year
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- ☆16Aug 25, 2025Updated 7 months ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- Collection of scanner checks missing in Burp☆15Apr 22, 2022Updated 3 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Network scanning tool designed to detect and report changes in open ports and services over time☆13Oct 16, 2025Updated 5 months ago
- Implementation of USENIX'2024 paper "Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy"☆19Apr 4, 2024Updated 2 years ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- My Awesome List☆12Updated this week
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆16Aug 8, 2025Updated 8 months ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆11Aug 15, 2024Updated last year
- ☆16Mar 26, 2023Updated 3 years ago
- ☆14Dec 24, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- MODBUS Penetration Testing Framework☆11Mar 27, 2019Updated 7 years ago
- CRLF Detection based on @BlackFan 's work See link below☆17Mar 14, 2024Updated 2 years ago
- Cheat-Sheet of tools for penetration testing☆53May 23, 2023Updated 2 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Attack & Defense CTF dashboard☆16Oct 7, 2021Updated 4 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago