☆22Dec 24, 2021Updated 4 years ago
Alternatives and similar repositories for hackersyntax
Users that are interested in hackersyntax are comparing it to the libraries listed below
Sorting:
- a collection of bash script and python to automate ZAP Security Tests☆11Oct 31, 2020Updated 5 years ago
- This Python code will quickly find duplicates or similarities in sets of data.☆10Feb 6, 2018Updated 8 years ago
- CTFs as you need them☆30May 3, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Aug 17, 2020Updated 5 years ago
- This is a clone of the of Introduction To Linux repo that I developed for the class I taught at the US Coast Guard Academy.☆65Aug 26, 2018Updated 7 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆35Apr 5, 2023Updated 2 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Oct 4, 2015Updated 10 years ago
- A stream implementation for Python that provides transparent base64 encoding and decoding of an underlying stream.☆17Feb 17, 2023Updated 3 years ago
- Compress a Python script to a command-line one-liner☆78Dec 31, 2022Updated 3 years ago
- Config files for my GitHub profile.☆18Apr 8, 2025Updated 11 months ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆21Jul 2, 2023Updated 2 years ago
- A spiky Australian bug hunter☆31Oct 3, 2020Updated 5 years ago
- Default plugins for Jaeles Scanner☆35Nov 5, 2020Updated 5 years ago
- ☆28Apr 9, 2020Updated 5 years ago
- The purpose of this repository is to archive any extraneous documents, or anything else that really has no specific category but needs a …☆84Aug 9, 2019Updated 6 years ago
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Jun 17, 2024Updated last year
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- ISC Kea DHCP server on Docker containers.☆10Apr 8, 2018Updated 7 years ago
- PowerCLI Scripts☆14Aug 10, 2019Updated 6 years ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 5 months ago
- In this article i've listed a collection of cheatsheets for digital forensics. It covering forensics topics for smartphone , memory , net…☆13Mar 8, 2020Updated 6 years ago
- WSO SHELL , wso shell , WSO.php , wso.php , webshell , wso-shell веб-шелл , шелл , WSO2.5 , WSO2.5.1 , WSO2.php , Shell download, C99 , …☆10Jun 25, 2016Updated 9 years ago
- The official StrawPoll API v3☆13Oct 8, 2023Updated 2 years ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- Fully automated Data Forensics / Recovery bot to recover, undelete, index, and organize as much as possible for any hard drive, and optio…☆13Feb 5, 2024Updated 2 years ago
- Code and notes for the 2021 HackTheBox Business CTF☆37Jul 25, 2021Updated 4 years ago
- [DEPRECATED] Use https://github.com/terraform-aws-modules/terraform-aws-redshift☆10Mar 14, 2018Updated 7 years ago
- ☆11Jul 10, 2024Updated last year
- ☆16May 13, 2021Updated 4 years ago
- The Scanner SDK for Windows enables a developer to create an application that can fully control a scanner from collecting barcode data, c…☆45Apr 20, 2025Updated 10 months ago
- Universal module for deploying vSphere virtual machines with Terraform☆40Jul 25, 2024Updated last year
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆14Jan 4, 2026Updated 2 months ago
- 🚀 Use Firecracker and helpings of bash to boot Ubuntu virtual machines very fast 🔥☆20Jul 15, 2023Updated 2 years ago
- pfSense Lab in UIT University☆10May 29, 2023Updated 2 years ago
- Copyasta Halu Untuk Yang Mau Melepas Stres.☆12Dec 14, 2025Updated 2 months ago
- A list of CVE's with Proof of Concepts☆11Jun 17, 2021Updated 4 years ago
- ☆12Sep 18, 2015Updated 10 years ago
- ☆12Dec 1, 2023Updated 2 years ago