#YOLO motherfuckers!
☆22Jan 16, 2018Updated 8 years ago
Alternatives and similar repositories for YoloSec-Framework
Users that are interested in YoloSec-Framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24May 21, 2021Updated 4 years ago
- ☆14Sep 22, 2023Updated 2 years ago
- Yet Another LinkedIn Scraper☆33Mar 9, 2023Updated 3 years ago
- Example of using Gauge and OWASP ZAP for test automation☆11Jan 9, 2020Updated 6 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆13Mar 15, 2021Updated 5 years ago
- Information about a signed UEFI Shell that can be used when Secure Boot is enabled.☆85Apr 27, 2021Updated 5 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- Remote Process Control Library☆26Dec 12, 2022Updated 3 years ago
- A vulnerable Play application for attackers.☆18Apr 28, 2026Updated last week
- Golng version of SharpDump that can be used to extract LSASS or any other proces. Provides token elevation prior to creating dump of high…☆21Oct 6, 2020Updated 5 years ago
- A series of tutorials and sketches pulled from various sources and modified for the Thotcon 0xA conference badge.☆15May 3, 2019Updated 7 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆38Oct 7, 2021Updated 4 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 6 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Z2A-BlackLotus Challenge stage 2 bootkit-rootkit analysis☆16May 29, 2023Updated 2 years ago
- Linkedin Employee Profile Scrapper☆68Oct 18, 2023Updated 2 years ago
- Particles (or stars) flowing smoothly in a Perlin Noise field. Very customizable.☆10Nov 24, 2025Updated 5 months ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆24May 16, 2013Updated 12 years ago
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆23Jul 20, 2021Updated 4 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Simple telnet server for write.as☆13Jan 8, 2019Updated 7 years ago
- A list of Per-Reviewed Journals, Books and Blogs on intelligence and Cybersecurity☆26Apr 1, 2024Updated 2 years ago
- Examples of transmitting computer data over radio waves☆12Dec 11, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Terraform & Packer code to create an up-to-date Kali Linux AWS EC2 instance☆16Jul 1, 2019Updated 6 years ago
- ☆14Apr 14, 2019Updated 7 years ago
- ☆32Aug 21, 2023Updated 2 years ago
- machine check exploitation☆57Aug 6, 2025Updated 9 months ago
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆15Nov 9, 2013Updated 12 years ago
- Music chords made easy☆15Oct 21, 2015Updated 10 years ago
- 📊 A small tool for displaying the WiFi traffic around you in the terminal.☆18Nov 3, 2019Updated 6 years ago
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Mar 13, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A bucket of various work-in-progress rtl-sdr ideas.☆22Mar 5, 2017Updated 9 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆14Jun 13, 2023Updated 2 years ago
- Terraform module providing a secure baseline for AWS☆18Jun 17, 2025Updated 10 months ago
- A python script to download APK files from apkpure.com☆13Apr 25, 2020Updated 6 years ago
- Research into the lack of padding for responses in pwned passwords☆11Feb 11, 2020Updated 6 years ago
- MagSpoof is a portable device that can spoof/emulate any magnetic stripe or credit card "wirelessly", even on standard magstripe readers.☆16Nov 25, 2015Updated 10 years ago
- Using AWS for GitHub Actions and various security features available through AWS Container Services like Amazon ECS, AWS Fargate, and Ama…☆16Mar 15, 2021Updated 5 years ago