Practice material for my subscribers.
☆24Oct 19, 2024Updated last year
Alternatives and similar repositories for Youtube
Users that are interested in Youtube are comparing it to the libraries listed below
Sorting:
- Wisper helps to maintain access to windows machine and have some other cool features like UAC Disable,Firewall Disable,Dumping Credential…☆15Apr 3, 2021Updated 4 years ago
- An Bug Hunters tool to find many Vulnerabilities using Google dorks☆19Nov 18, 2020Updated 5 years ago
- This is my journey into CTF, from my introduction into ethical hacking, covering the tools and competitions that I now engage with and th…☆14Feb 26, 2026Updated 3 weeks ago
- Config files for my GitHub profile.☆11Updated this week
- There are simple python scripts for penetration testing. Hacking with Python is a simple and extensible tool for getting started with eth…☆32Jun 24, 2022Updated 3 years ago
- ☆10Sep 3, 2023Updated 2 years ago
- ☆12Sep 3, 2023Updated 2 years ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated last year
- ☆11Jul 5, 2023Updated 2 years ago
- Sample website not fully filled/completed webiste>fork if u like this dont forget to starthe repo☆12Sep 3, 2023Updated 2 years ago
- 🔍LeakScanner - Inspired by Gitleaks☆14Aug 23, 2024Updated last year
- Python exploit for the vsftpd 2.3.4☆25Jul 24, 2024Updated last year
- An Automated Network Penetration and Vulnerability Analysis Tool Written In Bash☆29Apr 6, 2022Updated 3 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- FireProx written in Go☆20Apr 13, 2024Updated last year
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for se…☆47Aug 2, 2024Updated last year
- ☆11Jul 8, 2024Updated last year
- My Leetcode Problems' Solutions☆11Sep 7, 2023Updated 2 years ago
- Cyber Security Interview Questions ( and some answers )☆92Nov 2, 2023Updated 2 years ago
- Get hands-on with OSINT tools such as Recon-ng, Maltego, Shodan and Sherlock☆26May 23, 2024Updated last year
- This project was created as a part of Smart India Hackathon 2022 and aims to track nutritinal requirement and calorie intake of Students …☆12Sep 2, 2022Updated 3 years ago
- 🚀 A modern, responsive portfolio template for cybersecurity professionals built with React, TypeScript, and Flowbite. Features include s…☆38Feb 3, 2026Updated last month
- My curated list of resources for OSCP preperation☆263Nov 13, 2023Updated 2 years ago
- Udemy – Linux Heap Exploitation☆55Jun 14, 2021Updated 4 years ago
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- ☆13Dec 10, 2020Updated 5 years ago
- Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypas…☆19Dec 26, 2024Updated last year
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Oct 22, 2020Updated 5 years ago
- A collection of PDF/books about the modern web application security and bug bounty.☆26Apr 13, 2023Updated 2 years ago
- WolvCtf-2023-Challenges-Public☆12Apr 13, 2023Updated 2 years ago
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- A collection of awesome software, libraries, Learning Tutorials, documents, books, resources and interesting stuff about APIs☆19Jul 4, 2022Updated 3 years ago
- only 5 characters to rce☆15Aug 17, 2022Updated 3 years ago
- How to do recon on a web-application properly☆15Jul 12, 2022Updated 3 years ago
- ☆33Jan 25, 2021Updated 5 years ago
- Write-ups cho một số bài trên Reversing.kr☆12Mar 24, 2023Updated 2 years ago
- ☆30Jul 8, 2020Updated 5 years ago
- Compilation of Resources for TCM's Linux Privilege Escalation course☆582Oct 23, 2020Updated 5 years ago
- ☆67Jul 12, 2025Updated 8 months ago