Practice material for my subscribers.
☆24Oct 19, 2024Updated last year
Alternatives and similar repositories for Youtube
Users that are interested in Youtube are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Writeups For Exploit Education Challenges☆10Jun 21, 2021Updated 4 years ago
- ☆15Jan 4, 2021Updated 5 years ago
- An Bug Hunters tool to find many Vulnerabilities using Google dorks☆19Nov 18, 2020Updated 5 years ago
- This is my journey into CTF, from my introduction into ethical hacking, covering the tools and competitions that I now engage with and th…☆14Feb 26, 2026Updated last month
- Beginner-friendly web penetration testing projects for hands-on learning.☆39May 23, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated last year
- Caido plugin for jxscout☆15Nov 22, 2025Updated 4 months ago
- ☆11Jul 5, 2023Updated 2 years ago
- ☆14Mar 16, 2024Updated 2 years ago
- 🔍LeakScanner - Inspired by Gitleaks☆14Aug 23, 2024Updated last year
- A note of building The GNU C Library(https://www.gnu.org/software/libc/)☆36Nov 21, 2021Updated 4 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- FireProx written in Go☆20Apr 13, 2024Updated last year
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for se…☆46Aug 2, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆11Jul 8, 2024Updated last year
- Demos for Arm reverse engineering studying[Android ELF]☆18Mar 3, 2018Updated 8 years ago
- This is a cheatsheet of commands and processes to compromise an Active Directory environment. Everything documented in this repository is…☆27May 18, 2025Updated 10 months ago
- Secret Keywords patterns - aggregated from different sources.☆13Mar 15, 2021Updated 5 years ago
- Cyber Security Interview Questions ( and some answers )☆123Nov 2, 2023Updated 2 years ago
- Custom mini tools during Red Teaming engagements☆24Mar 7, 2026Updated last month
- Udemy – Linux Heap Exploitation☆56Jun 14, 2021Updated 4 years ago
- ☆13Dec 10, 2020Updated 5 years ago
- Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypas…☆19Dec 26, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Oct 22, 2020Updated 5 years ago
- ☆16Jul 1, 2023Updated 2 years ago
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- A collection of awesome software, libraries, Learning Tutorials, documents, books, resources and interesting stuff about APIs☆19Jul 4, 2022Updated 3 years ago
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆39Oct 17, 2024Updated last year
- How to do recon on a web-application properly☆15Jul 12, 2022Updated 3 years ago
- ☆11Mar 11, 2024Updated 2 years ago
- ☆30Jul 8, 2020Updated 5 years ago
- Write-ups cho một số bài trên Reversing.kr☆12Mar 24, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- BreachHunter is a powerful OSINT (Open Source Intelligence) tool designed for cybersecurity professionals, investigators, and ethical hac…☆26Sep 26, 2025Updated 6 months ago
- ☆68Jul 12, 2025Updated 9 months ago
- Compilation of Resources for TCM's Linux Privilege Escalation course☆584Oct 23, 2020Updated 5 years ago
- Open-source resource list for learning curriculums, development, design, blogs, business, communication, job searching, and other topics.☆16Jul 16, 2022Updated 3 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Aug 26, 2021Updated 4 years ago
- CTF WriteUps by team TWC☆16Jun 3, 2025Updated 10 months ago
- Notes on ECPPT☆25Dec 22, 2018Updated 7 years ago