☆32Nov 23, 2020Updated 5 years ago
Alternatives and similar repositories for Android-Applications
Users that are interested in Android-Applications are comparing it to the libraries listed below
Sorting:
- This script reads a text file containing domains, fetches the subdomains from crt.sh☆11May 31, 2023Updated 2 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆14Jan 17, 2023Updated 3 years ago
- Computer Science (data structures, algorithms), challenges solutions from LeetCode, Advent Of Code, Project Euler etc.☆12Oct 25, 2025Updated 4 months ago
- Terraform scripts that create a honey pot within AWS☆15Jun 7, 2024Updated last year
- Catalog and understand risks from granting IAM privileges☆13Sep 18, 2025Updated 5 months ago
- A minimal CLI client for CRXcavator.io☆15Dec 8, 2022Updated 3 years ago
- ☆17Apr 9, 2024Updated last year
- ☆24Jul 29, 2024Updated last year
- ☆15May 1, 2023Updated 2 years ago
- CTF (Capture The Flag) writeups, code snippets, scripts☆16Oct 18, 2018Updated 7 years ago
- Burp Suite extension to passively scan for applications revealing server error messages☆16Aug 15, 2023Updated 2 years ago
- Security challenges and CTFs created by the Penultimate team.☆13Feb 22, 2018Updated 8 years ago
- ☆24Feb 21, 2025Updated last year
- CSRF Scanner Extension for Burp Suite Pro☆20Feb 4, 2022Updated 4 years ago
- ☆21Mar 18, 2019Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- I'll post my custom shellcode I make here!☆22Oct 23, 2019Updated 6 years ago
- Example of a vulnerable NodeJS+Express+MySQL service☆20Jan 17, 2023Updated 3 years ago
- Kali Linux Web Penetration Testing Cookbook - Second Edition, published by Packt☆22Jan 15, 2021Updated 5 years ago
- ☆29Dec 26, 2025Updated 2 months ago
- another nmap summarising script☆26Oct 1, 2020Updated 5 years ago
- CTF Writeups☆26Oct 6, 2019Updated 6 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Feb 21, 2025Updated last year
- A codemod to transform Protractor into WebdriverIO tests☆27Jul 15, 2024Updated last year
- CTF Write-ups☆27Apr 7, 2019Updated 6 years ago
- AWS Security Checks☆40Jan 18, 2018Updated 8 years ago
- Password Guessing for different Web Portals☆29Nov 14, 2018Updated 7 years ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆33Jul 12, 2022Updated 3 years ago
- Approximation Raspberry Pi Emulator in Docker Container☆34Oct 25, 2017Updated 8 years ago
- ☆34May 24, 2023Updated 2 years ago
- Documentation and instructions☆35Jul 18, 2021Updated 4 years ago
- ☆134Aug 22, 2020Updated 5 years ago
- This is a container of web applications that work with OWASP Bug Bounty for Projects☆34Apr 28, 2025Updated 10 months ago
- Scripts to extract files from SCM directories left on web servers☆36Jun 19, 2023Updated 2 years ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Writeups for CTF competitions.☆33May 24, 2016Updated 9 years ago
- Various tools for managing bug bounty recon and exploration.☆48Dec 8, 2022Updated 3 years ago
- Official writeups for Hack The Boo CTF 2023☆45Dec 4, 2024Updated last year
- Fuzzing Payloads to Assist in Web Application Testing.☆166Jun 6, 2019Updated 6 years ago