Nakerah-lab
☆74Apr 20, 2025Updated 11 months ago
Alternatives and similar repositories for Nakerah-lab-v1
Users that are interested in Nakerah-lab-v1 are comparing it to the libraries listed below
Sorting:
- ☆21Feb 3, 2024Updated 2 years ago
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆12May 12, 2025Updated 10 months ago
- ☆18Nov 8, 2025Updated 4 months ago
- This repo contains Machines and Notes for practicing for EJPTv2 & CJCA exams☆149Jan 9, 2026Updated 2 months ago
- Auto powerful subdomains scanner - Auto check live subdomains☆18Jul 5, 2020Updated 5 years ago
- Rodan Exploitation Framework☆103Dec 1, 2025Updated 3 months ago
- A tool that automates the mundane tasks of pentesting Android apps. It uses APKTool and Dex2Jar.☆11May 29, 2020Updated 5 years ago
- ☆54Jun 4, 2024Updated last year
- ☆63Jul 14, 2025Updated 8 months ago
- Facebook Accounts Hacking Tool (By Brute Force Attack)☆11Jun 6, 2018Updated 7 years ago
- This Repo Contain Summary of The eLearnSecurity Web Application Penetration Tester certification Content☆20Apr 9, 2022Updated 3 years ago
- find any page admin and cpanel☆11Jul 29, 2017Updated 8 years ago
- CodeX Tool is to Convert Phishing URL to qr code !☆16Feb 16, 2021Updated 5 years ago
- Download all available books from Hindawi organization in PDF format | سكربت لتحميل جميع الكتب المتاحة على موقع مؤسسة هنداوي☆19Dec 8, 2022Updated 3 years ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- Repo for Relational Databases video☆93Jan 1, 2025Updated last year
- ☆18May 18, 2025Updated 10 months ago
- Bypassing Geo-restrictions on Disney+ & Netflix streaming☆20May 4, 2020Updated 5 years ago
- Tecnicas de escaneo con Nmap☆15Jul 21, 2023Updated 2 years ago
- ☆15Dec 1, 2021Updated 4 years ago
- Notes on ECPPT☆25Dec 22, 2018Updated 7 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Interview fo…☆66Mar 7, 2022Updated 4 years ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆42Jan 31, 2026Updated last month
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Simplified MITRE Use Cases, it describes the Attack and Detection☆49Sep 29, 2020Updated 5 years ago
- Gloom-Framework :: Linux Penetration Testing Framework☆52Oct 4, 2017Updated 8 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- A collection of XSS Attack vectors☆10Apr 26, 2025Updated 10 months ago
- ☆14Aug 22, 2025Updated 6 months ago
- A highly efficient and powerful Go script designed to detect sensitive data leaks in JavaScript files.☆21Dec 9, 2025Updated 3 months ago
- 𓆚 C implementation of the famous Emacs Hydra package to be used in terminal. Groups commands and assign each command a key binding☆21Jun 18, 2024Updated last year
- A tool to list the SSH clone URLs for all GitHub repos for a given user☆14Feb 7, 2016Updated 10 years ago
- Emulate the AWS IoT Button on a Raspberry Pi with a simple push button using this C++ sample☆10Sep 16, 2016Updated 9 years ago
- ITI Alexandria | 9-Months Scholarship | Intake 43 | Track: Open Source Applications Development☆12Jun 22, 2023Updated 2 years ago
- Using HDL, from Boolean algebra and elementary logic gates to building a Central Processing Unit, a memory system, and a hardware platfor…☆106Oct 2, 2020Updated 5 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 6 years ago
- A powerful reconnaissance tool written in Bash scripting. It can be used to scan networks, gather information about hosts, and identify v…☆17Oct 6, 2023Updated 2 years ago