Fixes corrupted Magic Bytes for PNG, JPG and JPEG
☆10Aug 4, 2021Updated 4 years ago
Alternatives and similar repositories for MagicBytes
Users that are interested in MagicBytes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Jul 6, 2024Updated last year
- ☆49Jul 8, 2025Updated 8 months ago
- Quick commands for pentesting/No typing!☆18Nov 21, 2023Updated 2 years ago
- A minimalist VS Code theme that makes your code shine like the moon☆16Jan 18, 2026Updated 2 months ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- A collection of scripts to explore domains and pick up information.☆13Sep 17, 2018Updated 7 years ago
- Osint tool to recover authors and emails on GitHub☆15Jul 2, 2025Updated 8 months ago
- ☆37Dec 3, 2024Updated last year
- Write-Ups for Huntress 2023 CTF☆12Nov 1, 2023Updated 2 years ago
- You'll find all the resources and presentations I have used in my talks and workshops☆12Nov 16, 2024Updated last year
- Just lists of lists of lists !☆17Oct 13, 2025Updated 5 months ago
- FiveM☆10Jan 18, 2022Updated 4 years ago
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- Contains nuclei templates for security testing and POCs.☆17Oct 19, 2024Updated last year
- Bookmarklet to find endpoints easily with one click☆79May 19, 2024Updated last year
- This will serve as links to write-ups about solving the challenges on ROOTCON's CTF through the years☆30Oct 5, 2024Updated last year
- Webcam phishing and IP logger connect with Discord webhook.☆13Nov 13, 2021Updated 4 years ago
- privilege escalation by piggy-backing user sudo requests☆16Feb 6, 2023Updated 3 years ago
- 🔍Lookup and Analyze Packet Capture ('PCAP') Files☆13Mar 17, 2019Updated 7 years ago
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- Script que automatiza ciertas comprobaciones para escalar privilegios en Linux☆20Oct 23, 2024Updated last year
- [DEPRECIATED] All writeups are moved to my main website☆14Mar 15, 2024Updated 2 years ago
- These are my personal notes for everything I learned regarding hacking APIs. Enjoy.☆21Mar 4, 2024Updated 2 years ago
- ☆12May 25, 2022Updated 3 years ago
- ☆13Apr 6, 2021Updated 4 years ago
- ☆16Dec 23, 2023Updated 2 years ago
- Reporting template for OSCP, VHL and more.☆17Oct 30, 2021Updated 4 years ago
- A Chrome extension for hiding the feed on Youtube.com☆17Aug 3, 2022Updated 3 years ago
- My course work about basic binary exploitation.🤿☆10Mar 16, 2022Updated 4 years ago
- OSINT Google search automation to find emails, names, locations and past breaches information☆19Jul 3, 2023Updated 2 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆17Dec 2, 2018Updated 7 years ago
- Import a pcap file into Neo4j and view the network graph. Maintainer: @djent-☆21Mar 11, 2022Updated 4 years ago
- PoC RCE in OpenSSH☆24Jul 1, 2024Updated last year
- Profile layout☆15Sep 11, 2025Updated 6 months ago
- Pakistan Cyber Security Challenge - 2023 CTF☆15Aug 14, 2025Updated 7 months ago
- ☆22Apr 11, 2025Updated 11 months ago
- This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.☆21Jul 7, 2024Updated last year
- Security Capture The Flag (CTF) competition writeups and learning notes.☆15Feb 14, 2017Updated 9 years ago
- A C2 Framework developed as an FYP☆12Feb 15, 2026Updated last month