CLI Version of SKF Labs
☆14Oct 3, 2023Updated 2 years ago
Alternatives and similar repositories for skf-cli
Users that are interested in skf-cli are comparing it to the libraries listed below
Sorting:
- Find Cve Exploits/POC from github☆17Jul 6, 2021Updated 4 years ago
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Mar 18, 2023Updated 2 years ago
- exploits.shodan.io's unofficial api no api-key needed☆16Apr 10, 2021Updated 4 years ago
- A collection of GitHub dorks for bug bounty hunters☆18Jun 24, 2022Updated 3 years ago
- Automated Recon Tool Installer☆15Jun 29, 2022Updated 3 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- Find secret keys from JS file☆52Jun 4, 2023Updated 2 years ago
- S3 Recon tips and tricks collected from different resources,Sorry if i missed to mention all resources owners☆27Nov 13, 2021Updated 4 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- ☆10Jul 21, 2021Updated 4 years ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- threejs risk-based heatmap☆12Aug 1, 2023Updated 2 years ago
- My GitHub profile☆11Feb 19, 2025Updated last year
- Clickjacking PoC Generator☆35Oct 1, 2020Updated 5 years ago
- ☆36Jun 23, 2022Updated 3 years ago
- ✅ Experience the power of an automated Insecure Direct Object Reference (IDOR) vulnerability detection tool. Safeguard your applications …☆66Mar 9, 2025Updated 11 months ago
- ☆13Feb 26, 2021Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- An LLM Based Research Paper Generator☆12Mar 16, 2025Updated 11 months ago
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- ☆10Jun 13, 2024Updated last year
- ☆11Dec 5, 2020Updated 5 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Updated this week
- Moodle 2.5+ resource module for displaying reveal.js multimedia HTML/CSS/JS slide show presentations☆15Jun 9, 2020Updated 5 years ago
- Matomo plugin for Docusaurus v2/v3☆14Dec 3, 2023Updated 2 years ago
- Browser History Histogram -- module for the Autopsy Forensic Browser☆11Sep 15, 2019Updated 6 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- Sudo exploit☆12Oct 15, 2019Updated 6 years ago
- ☆40Jun 5, 2021Updated 4 years ago
- Exploit for Joomla JCK Editor 6.4.4 (CVE-2018-17254)☆10Apr 17, 2021Updated 4 years ago
- How to Get Started into Bug Bounty Complete Beginner Guide ( Part 1 Web Pentesting ) Hello guys, after a lot of requests and questions o…☆11May 30, 2021Updated 4 years ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 7 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- Free cybersecurity training resources☆12Feb 5, 2020Updated 6 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Bug bounty policies☆10Jul 1, 2025Updated 8 months ago