abhaynayar / obsidianView external linksLinks
Writeups for CTF challenges.
☆78Oct 10, 2023Updated 2 years ago
Alternatives and similar repositories for obsidian
Users that are interested in obsidian are comparing it to the libraries listed below
Sorting:
- collection of scripts and stuff☆12Aug 15, 2016Updated 9 years ago
- Tool to get the top android apps for bug bounty purpose☆17Sep 10, 2020Updated 5 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 4 months ago
- Some guides about general topics on information security☆13Mar 19, 2019Updated 6 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- URL scanner for recon, vulnerabilities, secrets and more!☆12Sep 27, 2021Updated 4 years ago
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆20Oct 2, 2020Updated 5 years ago
- Tool to mass analyse potentially exposed Firebase databases on Android apps☆68Oct 15, 2019Updated 6 years ago
- Command line interface for Joplin Desktop using the WebClipper/Data API instead of full sync☆15Apr 15, 2023Updated 2 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Mar 2, 2021Updated 4 years ago
- android proxy setting tool☆43Jul 2, 2021Updated 4 years ago
- Apk infector && Frida injector☆22Jul 25, 2024Updated last year
- ☆435Jun 1, 2021Updated 4 years ago
- 快速对自己项目中引入的第三方开源库进行1day patch检索,patch数据每天晚上11点更新☆21Jan 27, 2022Updated 4 years ago
- GCP Audit checks projects in Google Cloud for compliance with CIS Benchmarks☆29May 19, 2025Updated 8 months ago
- plugins for Exeinfo Pe☆26Nov 13, 2025Updated 3 months ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- A WIP WebAssembly decompiler, targeted at Il2CPP games☆23Sep 28, 2024Updated last year
- ☆24May 22, 2024Updated last year
- Hidden input parameters finder☆19Jul 10, 2023Updated 2 years ago
- ProcDot Malware Sandbox☆26Jul 28, 2025Updated 6 months ago
- z3 scripts and ctf challenge solutions.☆24Dec 21, 2022Updated 3 years ago
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆26Mar 31, 2024Updated last year
- Crystal Anti-Exploit Protection 2012☆37May 31, 2020Updated 5 years ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆24Aug 20, 2024Updated last year
- CLI tool that extracts a regex pattern from a list of urls ( Rust )☆61Sep 14, 2022Updated 3 years ago
- ☆26Nov 9, 2021Updated 4 years ago
- Blog posts☆29Aug 7, 2020Updated 5 years ago
- Write-ups for crackmes and CTF challenges☆53Nov 24, 2022Updated 3 years ago
- This IDA Python plugin is intended to get you started creating IDA Plugins with Python, recognize the importance of deobfuscating strings…☆30Dec 16, 2020Updated 5 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Dec 6, 2025Updated 2 months ago
- 64-bit version of IDR (not complete, use as is)☆51Dec 30, 2018Updated 7 years ago
- ¯\_(ツ)_/¯☆30Dec 16, 2019Updated 6 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Note-taking repository for AWS Certified Cloud Practitioner course (CLF-CO2)☆13Feb 2, 2024Updated 2 years ago
- ☆65Aug 11, 2021Updated 4 years ago
- ☆69Jun 27, 2025Updated 7 months ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆277Jan 28, 2025Updated last year
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆32Jan 24, 2021Updated 5 years ago