Learning resources, blogs, news, SQL, PowerShell, SQL, Linux, Revers Engineering, Malware
☆33Dec 11, 2025Updated 3 months ago
Alternatives and similar repositories for Resources
Users that are interested in Resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cybersecurity courses I recommand☆14Jul 24, 2022Updated 3 years ago
- All of my threat intel recommendations for aspiring Information Security Analyst. This section contains information about evidence at ana…☆46Dec 3, 2025Updated 3 months ago
- ☆20Apr 5, 2023Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18May 23, 2022Updated 3 years ago
- All my blogs for ExpDev, HTB, BinaryExploit, Etc.☆13Jul 17, 2024Updated last year
- ☆19Jul 9, 2022Updated 3 years ago
- A Burp extension to find stuff ¯\_(ツ)_/¯☆11Apr 10, 2022Updated 3 years ago
- A tool written in both bash and python to parse doc/ drive links and collect secrets in those :)☆18Jul 7, 2022Updated 3 years ago
- Script to read input from stdin and encode it☆19Aug 23, 2023Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Aug 16, 2022Updated 3 years ago
- ☆12Feb 8, 2023Updated 3 years ago
- random scripts☆17Nov 10, 2024Updated last year
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- A curated list of awesome telegram osint resources.☆15May 2, 2022Updated 3 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- A Curated List of Awesome Telegram OSINT Tools, Sites & Resources☆55Aug 19, 2022Updated 3 years ago
- Soft and Hard Unlocks everything in Combat Master all using melon loader☆10Sep 11, 2024Updated last year
- useful crypto resources for CTF competition.☆18Mar 2, 2019Updated 7 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15May 8, 2020Updated 5 years ago
- demo material for my PowerShell Scripting Secrets presentation☆15Nov 20, 2017Updated 8 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- it's quite self explanatory: a crawler with sqlmap☆13Jul 13, 2017Updated 8 years ago
- Basic password cracker. These tools can be used to crack various types of password hashes, the program applies the technique to recover t…☆10Mar 22, 2023Updated 3 years ago
- This tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse pr…☆14Feb 20, 2023Updated 3 years ago
- Collection of Stuff☆14Nov 2, 2023Updated 2 years ago
- ☆19Nov 10, 2022Updated 3 years ago
- VI-SVC model is just VITS without MAS and DurationPredictor.☆10Nov 9, 2023Updated 2 years ago
- Ruby ARP Toolkit☆14Apr 15, 2021Updated 4 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- Installer for Kiosk Mode applications that sets lock mode.☆12Jan 28, 2021Updated 5 years ago
- Enables an LLM to remotely & securely control a jumphost using synchronous or asynchronous GET requests.☆13Mar 14, 2025Updated last year
- 🐧 A curated list of Linux developer resources 🐧☆24Apr 20, 2017Updated 8 years ago
- ☆25Dec 7, 2024Updated last year
- Collection of over 9000 xss payloads | heavy xss collection☆13Dec 6, 2022Updated 3 years ago
- HACK ATM MACHINES NEAREST TO YOU AND BECOME RICH!!! You can hack and break into a bank’s security ATM Machine without carrying guns or an…☆19Sep 14, 2016Updated 9 years ago
- This is the app is made to hack ATM card trust wallet address withdraw and online assess☆14Oct 27, 2022Updated 3 years ago
- 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆13Aug 26, 2023Updated 2 years ago
- ☆12Jul 1, 2018Updated 7 years ago