Linux-Based Reverse Shell Builder For Linux Penetration Testers
☆42Nov 12, 2021Updated 4 years ago
Alternatives and similar repositories for VSS
Users that are interested in VSS are comparing it to the libraries listed below
Sorting:
- Golang malware development library☆19Dec 14, 2021Updated 4 years ago
- Input/Output Assembly Header coded by me.☆10Sep 30, 2023Updated 2 years ago
- ☆41Jun 12, 2017Updated 8 years ago
- PEDA - Python Exploit Development Assistance for GDB☆66Jul 17, 2023Updated 2 years ago
- Powershell scripts used in David Bombal's YouTube videos.☆134Oct 27, 2020Updated 5 years ago
- Some CTF write up☆256Aug 29, 2025Updated 6 months ago
- ☆327May 13, 2022Updated 3 years ago
- Code examples for David Bombal's Python Videos☆454Jan 8, 2022Updated 4 years ago
- hak5 YouTube videos☆515Aug 9, 2022Updated 3 years ago
- UNIX-like reverse engineering framework and command-line toolset☆23,237Updated this week
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,826Aug 20, 2025Updated 7 months ago
- Automated Mass Exploiter☆5,217May 22, 2023Updated 2 years ago
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆5,499Mar 7, 2026Updated last week
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆12,550Mar 11, 2026Updated last week
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆11,050Updated this week
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,086Mar 17, 2024Updated 2 years ago
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆12,711Updated this week
- Ghidra is a software reverse engineering (SRE) framework☆65,820Updated this week
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆21,254Mar 5, 2025Updated last year
- ALL IN ONE Hacking Tool For Hackers☆55,239Oct 14, 2025Updated 5 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,106Updated this week
- Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.☆339,135Updated this week
- A node.js wrapper for Boilerpipe, an excellent Java library for boilerplate removal and fulltext extraction from HTML pages.☆52Jul 20, 2017Updated 8 years ago
- Miscellaneous value objects, parsers and formatters☆10Jan 8, 2026Updated 2 months ago
- Compile from the Faust programming language to Web Audio☆52May 8, 2016Updated 9 years ago
- python scripts to generate zoning command and push them to Cisco MDS switches using netmiko☆14Mar 14, 2017Updated 9 years ago
- Source code for 'Reactive with ClojureScript Recipes' by Nicolas Modrzyk☆10Oct 16, 2017Updated 8 years ago
- ☆22Jul 14, 2021Updated 4 years ago
- Simple JB finder for iOS☆18Nov 1, 2024Updated last year
- Home-built AR Smart Glasses using Edge TPU and Raspberry Pi☆13Jul 14, 2019Updated 6 years ago
- Analysis of "flash loan attack" from YouTuber https://www.youtube.com/watch?v=HynfsKoFlaw&t=105s☆11Jul 5, 2021Updated 4 years ago
- ☆13Apr 11, 2020Updated 5 years ago
- Sample app to classify beer bottle using Keras / Turi Create and Core ML.☆13Dec 8, 2022Updated 3 years ago
- 从零开始搭建开发平台☆42Jan 25, 2026Updated last month
- Official code release for ECCV2020 paper "Category Level Object Pose Estimation via Neural Analysis-by-Synthesis"☆40May 18, 2021Updated 4 years ago
- ☆32Apr 12, 2024Updated last year
- Learnings about windows Internals☆99Nov 10, 2023Updated 2 years ago
- ☆16Feb 6, 2021Updated 5 years ago
- An interface that features barely zero external dependencies beyond the Ollama API itself, making it lightweight and portable to easily i…☆12Mar 25, 2025Updated 11 months ago