☆18Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for Applications-Security
Users that are interested in Applications-Security are comparing it to the libraries listed below
Sorting:
- ☆11Dec 5, 2020Updated 5 years ago
- The focus of this cheat sheet is infrastructure,network penetration testing and web application penetration testing Perform.☆12Jun 24, 2018Updated 7 years ago
- All-in-One WP Migration-Backup-Finder☆15Nov 5, 2025Updated 3 months ago
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- Collection of templates (nuclei/jaeles..)☆16Jun 9, 2021Updated 4 years ago
- Programs I Made while learning python for pentesters.☆20Aug 26, 2022Updated 3 years ago
- IoT Hacking Kit Details☆19Aug 19, 2025Updated 6 months ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- Noobish Recon Automation☆20Feb 15, 2024Updated 2 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- External NSE script library (Collection of unofficial scripts) - Feel free to submit your NSE scripts!☆33Jan 5, 2022Updated 4 years ago
- Shell Please 1.0 : Reverse shell code generator.☆36Jul 3, 2022Updated 3 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Jan 22, 2022Updated 4 years ago
- ☆10Jul 21, 2021Updated 4 years ago
- The largest collection of wordlists in yaml for bug bounty tools☆37Apr 7, 2024Updated last year
- The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489☆31Mar 26, 2024Updated last year
- Recon_profile☆38May 18, 2020Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- ☆10Nov 15, 2020Updated 5 years ago
- ☆45Jun 5, 2021Updated 4 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- ☆12Nov 16, 2020Updated 5 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ☆10Jun 13, 2024Updated last year
- Tomcat的Filter型免杀内存马,主要思路是Bypass各种检查手段☆10Nov 26, 2021Updated 4 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Updated this week
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- The Linux Routing Agent for hyperglass☆13Feb 28, 2021Updated 5 years ago
- black Ip lists, dorks-collection☆16Updated this week
- ☆11Nov 22, 2021Updated 4 years ago
- ☆12Feb 16, 2017Updated 9 years ago
- Automated PoC of CVE-2021-44521☆10Feb 24, 2022Updated 4 years ago
- ☆90Oct 28, 2021Updated 4 years ago
- Penetration Testing Checklist☆37May 14, 2020Updated 5 years ago
- ☆36Jul 15, 2020Updated 5 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Jan 22, 2025Updated last year
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 7 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago