☆64Oct 9, 2023Updated 2 years ago
Alternatives and similar repositories for Facial-Recognition-PenTest-Checklist
Users that are interested in Facial-Recognition-PenTest-Checklist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Jun 18, 2023Updated 2 years ago
- Challenge Python☆19Apr 26, 2023Updated 2 years ago
- this nuclei template finds back up files☆23Aug 25, 2025Updated 7 months ago
- ☆78Apr 25, 2023Updated 2 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆17Jun 9, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- ☆244Jan 23, 2025Updated last year
- Dump paths & pages from Next.js Manifest☆15Mar 19, 2024Updated 2 years ago
- ☆17Jun 15, 2025Updated 10 months ago
- ☆69Jun 8, 2023Updated 2 years ago
- Security and Privacy Failures in Popular 2FA Apps☆20Oct 5, 2023Updated 2 years ago
- ☆317Jul 6, 2024Updated last year
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆22Aug 20, 2024Updated last year
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- ☆19Jun 25, 2024Updated last year
- ☆42Dec 24, 2024Updated last year
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 4 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- MalBox is a quick and dirty setup to create a malware analysis VM☆14Aug 27, 2024Updated last year
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- Mini recon script to identify the links and sensitive information from a particular link☆22Mar 9, 2021Updated 5 years ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 3 years ago
- RACF Database Parser☆12Apr 4, 2024Updated 2 years ago
- Script to Automate installtion of Apps ,frida server and moving Burpsuite certificate to root folder☆269Jan 28, 2024Updated 2 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆60Jun 28, 2020Updated 5 years ago
- An android application for managing custom kernel tweak (BLD, BLN, BLX Touchwake, Governor, Deep Idle etc.)☆24Apr 5, 2012Updated 14 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆26Apr 30, 2025Updated 11 months ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Apr 30, 2023Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆21Feb 24, 2024Updated 2 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Tool for visualizing the Open SSF Scorecard Api data in a human friendly way☆19Nov 27, 2025Updated 4 months ago
- Differential Fuzzer to hunt for logic bugs on Perl Modules☆26Mar 21, 2026Updated 3 weeks ago