A clean looking FREE portfolio template for devs. Built with NextJS & TailwindCSS
☆39Oct 12, 2024Updated last year
Alternatives and similar repositories for logsfolio
Users that are interested in logsfolio are comparing it to the libraries listed below
Sorting:
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Reverse IP Lookup Tool that allows you to use an IP address to identify all websites hosted on a server.☆10Jun 29, 2016Updated 9 years ago
- Examples related to Amazon Lightsail☆12Jul 17, 2024Updated last year
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- My Personal Library for CTF's☆12Apr 3, 2018Updated 7 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Visually analyze basic block code coverage in Binary Ninja using Pin output.☆11Oct 6, 2017Updated 8 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- Build an SSL capable transparent proxying WiFi Access point with budget commodity hardware and Open Source software.☆15Mar 1, 2013Updated 13 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- ☆12Sep 25, 2020Updated 5 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Tutorial to create a bootable Kali USB drive with persistent storage.☆10May 23, 2017Updated 8 years ago
- Get version headers from a list of websites☆12Oct 1, 2020Updated 5 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- Solutions from multiple CTFs we have played.☆11Oct 16, 2018Updated 7 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.☆11Aug 1, 2024Updated last year
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- A simple (and rather ad-hoc) port scanner for Tor hidden services.☆28Mar 5, 2015Updated 10 years ago
- https://github.com/nongiach/arm_now rootfs and kernel☆11Sep 16, 2022Updated 3 years ago
- ☆13Jul 12, 2025Updated 7 months ago
- Demonstrate the use of Ansible best practices in a workshop☆10Jul 7, 2019Updated 6 years ago
- This repository contains all the talk materials and ebook from the talk System Hardening Using Ansible given at All Day DevOps 2016 onlin…☆12Nov 16, 2016Updated 9 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- ☆13Oct 3, 2023Updated 2 years ago