Manage variables effectively when playing CTFs
☆10Jul 26, 2025Updated 7 months ago
Alternatives and similar repositories for AYO
Users that are interested in AYO are comparing it to the libraries listed below
Sorting:
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.☆17Sep 30, 2025Updated 5 months ago
- A C2 framework inspired by anime, made in python.☆12Feb 8, 2026Updated 3 weeks ago
- TryHackMe Roadmap☆52Apr 23, 2024Updated last year
- Dump files via Directory Traversal, LFI, Arbitrary File Read in a breeze with the help of ffuf☆19Dec 20, 2023Updated 2 years ago
- A tool that can used for hacking :- reverse-shells, email-attacks, ip tracker and tracer.☆10Aug 3, 2022Updated 3 years ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Dec 13, 2025Updated 2 months ago
- ☆13Aug 21, 2022Updated 3 years ago
- ☆31Feb 20, 2026Updated last week
- CVE-2022-22978 Spring-Security bypass Demo☆16Jun 2, 2022Updated 3 years ago
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆15Oct 16, 2024Updated last year
- ☆13Apr 14, 2024Updated last year
- Wireless Network Security Analysis Tool☆16Apr 27, 2025Updated 10 months ago
- Full imageboard engine, written with python3.11, with realtime posts using socketIO.☆18Feb 24, 2026Updated last week
- rootkit and kernel pentesting for Linux, most advanced malware for SUID.☆10Jul 18, 2024Updated last year
- ☆14Mar 6, 2025Updated 11 months ago
- the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.☆14Sep 8, 2024Updated last year
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Nov 1, 2024Updated last year
- ☆14Apr 23, 2022Updated 3 years ago
- Config files for my GitHub profile.☆14Jul 25, 2024Updated last year
- My dotfiles☆12Nov 18, 2025Updated 3 months ago
- A ring0 Loadable Kernel Module (Linux) for latest kernels 6.x☆104Dec 16, 2025Updated 2 months ago
- A Linux persistence tool!☆160Sep 16, 2025Updated 5 months ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 10 months ago
- Release Neo the Evil-Ducky, a scripts for rubber-ducky USB.☆13Jul 11, 2024Updated last year
- ☆16Jul 30, 2024Updated last year
- ☆17Apr 23, 2022Updated 3 years ago
- WebP codec: library to encode and decode images in WebP format.☆18Apr 20, 2015Updated 10 years ago
- Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.☆17Jun 25, 2024Updated last year
- A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies, allowing remote code execution through fo…☆19Nov 21, 2025Updated 3 months ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆36Oct 17, 2021Updated 4 years ago
- Command line client for HackTheBox☆25Feb 26, 2024Updated 2 years ago
- Bad scripts I made doing CTF's☆21Jan 18, 2024Updated 2 years ago
- Custom Black arch based docker container for continuous automated red teaming☆24Jan 21, 2026Updated last month
- Enumeration & fingerprint tool☆23Mar 3, 2024Updated 2 years ago
- ☆26Jun 5, 2024Updated last year
- Cross Site Scripting ( XSS ) Vulnerability Payload List☆23Feb 23, 2021Updated 5 years ago
- a personal leaks database to improve combolists and for more effective pentests☆25Sep 4, 2023Updated 2 years ago
- Anti-analysis tool that obfuscates ELF files☆36Mar 16, 2021Updated 4 years ago
- CVE-2025-5777 (CitrixBleed 2) - Critical memory leak vulnerability affecting Citrix NetScaler ADC and Gateway devices☆45Jul 8, 2025Updated 7 months ago