A list of collected articles and resources from the website Peerlyst
☆17Dec 14, 2016Updated 9 years ago
Alternatives and similar repositories for Peerlyst
Users that are interested in Peerlyst are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- ESP8266 ROM Bootloader utility☆17Jul 17, 2017Updated 8 years ago
- This is an automated tool collection written in Python for vulnerability assessment and exploitation. It also includes solution of SPSE -…☆21Mar 21, 2017Updated 9 years ago
- ☆20Oct 16, 2019Updated 6 years ago
- ☆11Jun 18, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Expand CIDR ranges to IPv4 addresses☆13Jul 28, 2022Updated 3 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆15Oct 25, 2017Updated 8 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆37Aug 13, 2018Updated 7 years ago
- A PowerShell script for Windows security checks, covering Windows Defender, firewall, UAC, updates, BitLocker, network sharing, PowerShel…☆25Aug 2, 2025Updated 8 months ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- A centralized place to collect USB Ninja payloads☆17Jan 10, 2019Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Emv card emulator☆12Aug 21, 2018Updated 7 years ago
- This is a container of web applications that work with OWASP Bug Bounty for Projects☆34Apr 28, 2025Updated 11 months ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Application to get the information from EMV based Credit or Debit Card.☆18Feb 11, 2016Updated 10 years ago
- Automatically generating WADL in Spring MVC REST application☆28Jul 7, 2022Updated 3 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Voice commands (command your PC with spoken commands)☆24Sep 10, 2014Updated 11 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Docker image with ps4-exploit-host application☆10Mar 11, 2024Updated 2 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- Bypassing ssl pinning for facebook messenger android app☆12Nov 12, 2018Updated 7 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- a JS tool that let you take screenshot of many hosts.☆13Apr 7, 2026Updated last week
- Simple, lightweight and compact key logger written for fun ...☆17Sep 12, 2018Updated 7 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- ☆20Jun 15, 2017Updated 8 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆63Oct 29, 2012Updated 13 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Jan 17, 2018Updated 8 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- A simple powershell script which gives handy compliance report.☆19Nov 27, 2017Updated 8 years ago
- ☆12May 9, 2017Updated 8 years ago
- Hacking challenges☆16Oct 17, 2019Updated 6 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆49May 1, 2022Updated 3 years ago