☆12Oct 25, 2020Updated 5 years ago
Alternatives and similar repositories for Secure-Coding-References
Users that are interested in Secure-Coding-References are comparing it to the libraries listed below
Sorting:
- My Linux installation instruction.☆14Jan 15, 2026Updated last month
- Just a small piece for poor souls☆19Jan 7, 2023Updated 3 years ago
- Elevation Of Privileges Proof of Concept for Windows (win7-win10)☆32Nov 4, 2020Updated 5 years ago
- Java command-line tools for comparing results to ground truth for table location and structure detection as used in the ICDAR 2013 Table …☆33May 31, 2020Updated 5 years ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- ☆15Mar 21, 2025Updated 11 months ago
- STIG FireFox the Easy Way☆15Jul 26, 2024Updated last year
- Gaia EDR3 star database for Celestia☆12Sep 23, 2025Updated 5 months ago
- The Ultimate Recon Framework☆11Mar 29, 2024Updated last year
- Code repository for MDX with Microsoft SQL Server 2016 Analysis Services Cookbook by Packt☆12Jan 30, 2023Updated 3 years ago
- ☆10Feb 28, 2023Updated 3 years ago
- Web site amnezia.org☆10Sep 8, 2023Updated 2 years ago
- Udemy course form Zsecurity learning python and ethical hacking☆14May 21, 2021Updated 4 years ago
- ☆12Feb 20, 2025Updated last year
- Curated list of CLI tools and plugins that help you use AI in Vim, Neovim, and the Terminal.☆23Updated this week
- ☆16Updated this week
- ☆13Jun 26, 2025Updated 8 months ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- Logged PS Remote Command Wrapper for Blue Team Forensics/IR☆11Apr 12, 2018Updated 7 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- An introduction to building and breaking ciphers with Python. Book by AL Sweigart☆11Mar 25, 2019Updated 6 years ago
- Zen and the art of multi-cloud maintenance (Terraform, Consul, Vault and Nomad) - Lev Andelman & Andrei Burd☆12May 20, 2020Updated 5 years ago
- simple tool for finding javascript files from webapps☆10Apr 20, 2023Updated 2 years ago
- Recon for Pentesting and BugBounty 🕵️☆14Jan 14, 2026Updated last month
- CudaText context menu shell extension for Windows Explorer☆11Oct 31, 2025Updated 4 months ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Dec 13, 2025Updated 2 months ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- OSCP preparation☆12Sep 18, 2025Updated 5 months ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- ☆11Jan 24, 2023Updated 3 years ago
- 🔐 HIROO is an FUD Remote Administration Tool (RAT) Generator☆16Aug 14, 2019Updated 6 years ago
- Awesome resources for learning Mandarin Chinese☆14Dec 6, 2022Updated 3 years ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- this repository is a base so everyone can modify it according to there thoughts and process used☆10Jun 9, 2021Updated 4 years ago
- ☆10Mar 3, 2024Updated last year
- Collection of all the resources published by Payatu.☆11Aug 11, 2025Updated 6 months ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago