Fixes corrupted Magic Bytes for PNG, JPG and JPEG
☆11Aug 4, 2021Updated 4 years ago
Alternatives and similar repositories for MagicBytes
Users that are interested in MagicBytes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Jul 6, 2024Updated last year
- ☆50Updated this week
- Quick commands for pentesting/No typing!☆19Nov 21, 2023Updated 2 years ago
- A minimalist VS Code theme that makes your code shine like the moon☆16Jan 18, 2026Updated 3 months ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A collection of scripts to explore domains and pick up information.☆13Sep 17, 2018Updated 7 years ago
- Osint tool to recover authors and emails on GitHub☆15Jul 2, 2025Updated 10 months ago
- ☆37Dec 3, 2024Updated last year
- Write-Ups for Huntress 2023 CTF☆12Nov 1, 2023Updated 2 years ago
- You'll find all the resources and presentations I have used in my talks and workshops☆12Nov 16, 2024Updated last year
- Just lists of lists of lists !☆17Oct 13, 2025Updated 6 months ago
- FiveM☆10Jan 18, 2022Updated 4 years ago
- Packet Analysis on Steroids☆14Oct 20, 2022Updated 3 years ago
- Contains nuclei templates for security testing and POCs.☆17Oct 19, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- IaC threat modeler with STRIDE, MITRE ATT&CK, and PASTA frameworks. REST API, GraphQL, and Docker support for Terraform, CloudFormation, …☆57Mar 25, 2026Updated last month
- Bookmarklet to find endpoints easily with one click☆80May 19, 2024Updated last year
- Webcam phishing and IP logger connect with Discord webhook.☆13Nov 13, 2021Updated 4 years ago
- This will serve as links to write-ups about solving the challenges on ROOTCON's CTF through the years☆30Oct 5, 2024Updated last year
- 🔍Lookup and Analyze Packet Capture ('PCAP') Files☆14Mar 17, 2019Updated 7 years ago
- privilege escalation by piggy-backing user sudo requests☆16Feb 6, 2023Updated 3 years ago
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- Script que automatiza ciertas comprobaciones para escalar privilegios en Linux☆20Oct 23, 2024Updated last year
- [DEPRECIATED] All writeups are moved to my main website☆14Mar 15, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- These are my personal notes for everything I learned regarding hacking APIs. Enjoy.☆21Mar 4, 2024Updated 2 years ago
- ☆12May 25, 2022Updated 3 years ago
- ☆17Dec 23, 2023Updated 2 years ago
- ☆13Apr 6, 2021Updated 5 years ago
- Reporting template for OSCP, VHL and more.☆17Oct 30, 2021Updated 4 years ago
- A Chrome extension for hiding the feed on Youtube.com☆17Aug 3, 2022Updated 3 years ago
- My course work about basic binary exploitation.🤿☆12Mar 16, 2022Updated 4 years ago
- OSINT Google search automation to find emails, names, locations and past breaches information☆20Jul 3, 2023Updated 2 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆18Dec 2, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Import a pcap file into Neo4j and view the network graph. Maintainer: @djent-☆21Mar 11, 2022Updated 4 years ago
- PoC RCE in OpenSSH☆24Jul 1, 2024Updated last year
- Profile layout☆15Sep 11, 2025Updated 7 months ago
- Pakistan Cyber Security Challenge - 2023 CTF☆15Aug 14, 2025Updated 8 months ago
- ☆22Apr 11, 2025Updated last year
- This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.☆21Jul 7, 2024Updated last year
- Security Capture The Flag (CTF) competition writeups and learning notes.☆15Feb 14, 2017Updated 9 years ago