OHDUDEOKNICE / S1REN-searchvectorView external linksLinks
☆14Nov 16, 2024Updated last year
Alternatives and similar repositories for S1REN-searchvector
Users that are interested in S1REN-searchvector are comparing it to the libraries listed below
Sorting:
- Temple Stuart☆37Updated this week
- A collection of study notes and resources for the Offensive Security Certified Professional (OSCP) certification exam. Includes summaries…☆63Nov 15, 2025Updated 3 months ago
- ☆10Dec 24, 2024Updated last year
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- ☆133Jul 3, 2023Updated 2 years ago
- Automated IP-focused reconnaissance tool for penetration testing. Autorecon like☆39Feb 5, 2026Updated last week
- ☆12Feb 8, 2018Updated 8 years ago
- Automated authorization checks with multiple headers tool written in golang☆11Jan 3, 2024Updated 2 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Template project for Offensive Security Exam Documentation☆11Feb 25, 2020Updated 5 years ago
- Setup for hashcat on AWS using CloudFormation☆15Mar 20, 2022Updated 3 years ago
- A cheatsheet I made while taking OSCP+/PEN-200 in 2024-2025☆33Apr 1, 2025Updated 10 months ago
- I have created this dashboard to track oscp preparation. I have used several resources and has been mentioned in dashboard. Tjnull's blog…☆13Jul 8, 2022Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Feb 26, 2024Updated last year
- Azure DevOps is an end-to-end software development platform.☆13Aug 25, 2025Updated 5 months ago
- Markdown repo for notes on all things redteaming☆52Apr 19, 2024Updated last year
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago
- regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper☆12Jun 8, 2024Updated last year
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Preconfigured Kali Linux 2025 template for UTM on Apple Silicon, updated as of July 29, 2025 with the latest official keys and sources fr…☆27Nov 1, 2025Updated 3 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆15Nov 9, 2013Updated 12 years ago
- gSAST - Grep Static Analysis Security Tool☆13Mar 30, 2024Updated last year
- A really good cybersec reading materials.☆13Aug 13, 2022Updated 3 years ago
- ☆65Jan 11, 2021Updated 5 years ago
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- Deletes old email from my Gmail accounts☆15Oct 13, 2017Updated 8 years ago
- A python based semi-automatic buffer overflow exploit script☆16Sep 6, 2020Updated 5 years ago
- ☆17Jul 17, 2023Updated 2 years ago
- Cloudshell proof of concept for LiveOverflow☆15Aug 8, 2019Updated 6 years ago
- Discord bot linked with YATA☆19Oct 9, 2022Updated 3 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- Wiki documentation for Adventure Lookup☆13May 23, 2016Updated 9 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- ☆15Jun 27, 2023Updated 2 years ago
- OSCP Cheatsheet☆16Jun 14, 2023Updated 2 years ago