ZishanAdThandar / blogView external linksLinks
CTF and Bug Bounty Hunting WriteUps.
☆21Jan 23, 2026Updated 3 weeks ago
Alternatives and similar repositories for blog
Users that are interested in blog are comparing it to the libraries listed below
Sorting:
- CVE-2025-4123 - Grafana Tool☆30Jun 4, 2025Updated 8 months ago
- ☆24Feb 10, 2026Updated last week
- CyberSecurity Resources and Tools☆26Jun 24, 2024Updated last year
- this nuclei template finds back up files☆22Aug 25, 2025Updated 5 months ago
- ☆15Sep 21, 2019Updated 6 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- A simple steganalysis script writen in Python☆26Dec 12, 2013Updated 12 years ago
- LinkedIn Search Tools & Google Dorks & X-Ray Search☆76Jun 28, 2022Updated 3 years ago
- This is Same as Burpsuite Collaborator | Free | Burpsuite Collaborator Server☆12Jun 27, 2025Updated 7 months ago
- ☆13Aug 5, 2025Updated 6 months ago
- Data Structures and Algorithms. Contribute and Learn together.☆11Oct 11, 2022Updated 3 years ago
- Good resources about web security that I have read.☆27Jul 23, 2023Updated 2 years ago
- Source for Pentester Land☆39Nov 3, 2022Updated 3 years ago
- ☆32Jun 12, 2024Updated last year
- A curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆75Dec 3, 2023Updated 2 years ago
- D-TECT - Pentesting the Modern Web☆36Sep 29, 2017Updated 8 years ago
- A comprehensive guide to using AI technologies safely while protecting your privacy. Covers self-hosted solutions, popular AI services, b…☆45May 1, 2025Updated 9 months ago
- A small utility to generate a word security report by using a knowledge base(XLSX).☆12Nov 25, 2023Updated 2 years ago
- Repository containing machine solving attempts and results generated by BoxPwnr☆15Feb 10, 2026Updated last week
- CEH Practical Resources, Learning, Tutorials | Certified Ethical Hacker☆34Mar 19, 2021Updated 4 years ago
- Headless web crawler for bugbounty and penetration-testing/redteaming☆39Mar 25, 2024Updated last year
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆40Nov 20, 2025Updated 2 months ago
- Info & resources for CSC 325 Computer Architecture at TCNJ☆11Oct 1, 2020Updated 5 years ago
- Crawler based on a modified browser to detect online tracking.☆11Jul 19, 2023Updated 2 years ago
- A little bit of help.☆13Jul 25, 2024Updated last year
- A technical companion repository archiving code implementations and research artifacts shared on ResearchGate.☆12Feb 7, 2026Updated last week
- Collection of exploits developed by your friendly clown☆15Oct 18, 2025Updated 3 months ago
- Automated HTTP Request Repeating With Burp Suite☆40Apr 3, 2023Updated 2 years ago
- DNS-Blocklists: For a better internet - keep the internet clean!☆11Feb 1, 2026Updated 2 weeks ago
- 403 Bypasser With auto payload generation☆12Aug 8, 2024Updated last year
- Quick and dirty script to parse bplists with Ruby☆13Oct 29, 2020Updated 5 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆11May 19, 2020Updated 5 years ago
- This repo stores something about reverse engineering technique fundemental☆15Jan 16, 2023Updated 3 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- Whether you're a seasoned expert or a beginner, Kali GPT helps streamline your workflow, making penetration testing more efficient and ac…☆19Feb 9, 2026Updated last week
- Python script that types out the text that exists in clipboard.☆12Mar 31, 2025Updated 10 months ago
- RSA cracking algorithm based on Pollard factorization (Pollard's p-1 method).☆15Jun 28, 2023Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year