YasserGersy / EnumsView external linksLinks
Just lists of lists of lists !
☆17Oct 13, 2025Updated 4 months ago
Alternatives and similar repositories for Enums
Users that are interested in Enums are comparing it to the libraries listed below
Sorting:
- Nuclei POC 模板☆10Feb 17, 2023Updated 2 years ago
- CTF Writeups☆12Feb 25, 2023Updated 2 years ago
- Computer Science (data structures, algorithms), challenges solutions from LeetCode, Advent Of Code, Project Euler etc.☆12Oct 25, 2025Updated 3 months ago
- This repository contains hit lists to use for web application content discovery.☆11May 31, 2017Updated 8 years ago
- All the information provided on this site is for educational purposes only.☆18Feb 27, 2024Updated last year
- A simple python script which can check HTTP status of branch of URLs/Subdomains and grab URLs/Subdomain title☆12Oct 16, 2019Updated 6 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Jun 6, 2024Updated last year
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Mar 1, 2019Updated 6 years ago
- Wordlist to get files/ folders listed by the app that may expose passwords, sensitive file or folders☆22Jul 10, 2020Updated 5 years ago
- Some useful test data or payloads☆24Oct 30, 2021Updated 4 years ago
- Hacking tools☆148Feb 11, 2025Updated last year
- Python 3 Reverse Shell☆26Jan 2, 2022Updated 4 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆36Aug 13, 2025Updated 6 months ago
- Process URLs and remove duplicate query parameters.☆28Mar 19, 2024Updated last year
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆32Aug 28, 2023Updated 2 years ago
- A small utility to generate a word security report by using a knowledge base(XLSX).☆12Nov 25, 2023Updated 2 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- ☆10Dec 3, 2021Updated 4 years ago
- ☆29Dec 13, 2023Updated 2 years ago
- Bug Bounty Tools☆34Jul 2, 2020Updated 5 years ago
- Multi-threaded port scanner written in C++☆13Dec 17, 2019Updated 6 years ago
- A simple Arduino Library to send message on Discord using webhook☆14Feb 25, 2025Updated 11 months ago
- 一款基于python的在命令台运行的密码学工具箱V1.0版☆19Dec 10, 2024Updated last year
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆15Jan 17, 2026Updated 3 weeks ago
- Redefining Web Operating Systems☆18Sep 22, 2025Updated 4 months ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- BpArsenal, a Burp Suite plugin that can quickly convert http requests into command-line tool execution, launch third-party tools and open…☆22Oct 31, 2025Updated 3 months ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- Script Open Source Facebook Crack Indonesia👾💥☆12Jan 6, 2024Updated 2 years ago
- USB rubber ducky reverse shell with disabling windows defender☆11Apr 17, 2021Updated 4 years ago
- ☆36Jul 15, 2020Updated 5 years ago
- A simple tool to manipulate window objects in Windows☆45Dec 22, 2016Updated 9 years ago
- Tool is to check for Cache Deception Attack Both For Authenticated and UnAuthenticated Pages☆44Nov 23, 2021Updated 4 years ago
- This project uses an ESP32-Cam connected to a motion sensor. When the motion sensor is activated, a photo will be submitted to the desire…☆11Sep 4, 2021Updated 4 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- ☆11Feb 3, 2026Updated last week