Y000o / DorkingView external linksLinks
☆10Aug 28, 2020Updated 5 years ago
Alternatives and similar repositories for Dorking
Users that are interested in Dorking are comparing it to the libraries listed below
Sorting:
- code reviews to practice☆18Jul 22, 2021Updated 4 years ago
- From this app, Connect a Phone, Extract any app from It, Decompile, Deobfuscate, Remove Certificate Pinning and Repackage it. Meanwhile, …☆27Sep 26, 2025Updated 4 months ago
- ☆16Feb 6, 2026Updated last week
- Front de la pagina Machete Exactas para subir resueltos y demas de las materias de FCEN UBA☆12Sep 24, 2024Updated last year
- OWASP Coimbatore's Web & Project Repository☆13Jan 23, 2026Updated 3 weeks ago
- Starter Projects for the Docker Course☆11Dec 25, 2025Updated last month
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 5 years ago
- ☆15Jul 3, 2025Updated 7 months ago
- Convert auditd logs to json format☆10Apr 3, 2019Updated 6 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- verinice.veo is a cloud-native application for managing information security and data protection☆20Feb 3, 2026Updated last week
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- Demo code showing how to use Java's StructuredTaskScope☆12Dec 10, 2025Updated 2 months ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated last month
- ☆10Feb 27, 2019Updated 6 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- My blog☆10Oct 6, 2025Updated 4 months ago
- ☆10May 6, 2017Updated 8 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- Chef library cookbook for managing AWS Security Groups☆11Sep 7, 2016Updated 9 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 7 months ago
- Source code related of the articles posted in medium.com☆12Nov 2, 2020Updated 5 years ago
- VM-Series templates for Google Cloud Platform☆11Jan 15, 2020Updated 6 years ago
- Collection of resources for responding to the Log4j set of vulnerabilities.☆11Feb 22, 2022Updated 3 years ago
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆15Jun 2, 2025Updated 8 months ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- ☆13Apr 8, 2021Updated 4 years ago
- ☆12Aug 5, 2023Updated 2 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- A sample API that retrieves constellations as an example to demonstrate features in the OpenAPI 3.0 specification.☆14Nov 12, 2024Updated last year
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago