Writeups for CTF challenges.
☆78Oct 10, 2023Updated 2 years ago
Alternatives and similar repositories for obsidian
Users that are interested in obsidian are comparing it to the libraries listed below
Sorting:
- Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)☆13Jul 30, 2021Updated 4 years ago
- Tool to get the top android apps for bug bounty purpose☆17Sep 10, 2020Updated 5 years ago
- Tool to mass analyse potentially exposed Firebase databases on Android apps☆68Oct 15, 2019Updated 6 years ago
- URL scanner for recon, vulnerabilities, secrets and more!☆12Sep 27, 2021Updated 4 years ago
- A bunch of JEB python scripts☆46Jun 23, 2021Updated 4 years ago
- collection of scripts and stuff☆12Aug 15, 2016Updated 9 years ago
- Web Exploitation Workflow for CTF Challenges☆54Dec 11, 2016Updated 9 years ago
- Some guides about general topics on information security☆13Mar 19, 2019Updated 7 years ago
- VinCSS Reverse Engineering, Malware Analysing Tools & Ultilities☆27Nov 26, 2021Updated 4 years ago
- ☆55Aug 22, 2017Updated 8 years ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆32Jan 24, 2021Updated 5 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Mar 2, 2021Updated 5 years ago
- Sample Obsidian's vault for web pentesting☆107Aug 8, 2024Updated last year
- Reverse Shell as a Service☆32Jul 6, 2020Updated 5 years ago
- ☆65Aug 11, 2021Updated 4 years ago
- 逆向小红伞杀毒软件驱动——avdevprot☆24Dec 3, 2017Updated 8 years ago
- 快速对自己项目中引入的第三方开源库进行1day patch检索,patch数据每天晚上11点更新☆21Jan 27, 2022Updated 4 years ago
- Prototype Pollution exploits collection☆37Aug 8, 2021Updated 4 years ago
- CLI tool that extracts a regex pattern from a list of urls ( Rust )☆61Sep 14, 2022Updated 3 years ago
- Google maps api key checker for pentesting purpose☆28Oct 12, 2022Updated 3 years ago
- HTML5 Training material for Attack and Secure training sessions.☆43Feb 25, 2023Updated 3 years ago
- LLVM based devirtualization PoC’s.☆21Dec 11, 2021Updated 4 years ago
- A WIP WebAssembly decompiler, targeted at Il2CPP games☆23Sep 28, 2024Updated last year
- ☆45Jun 5, 2021Updated 4 years ago
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆20Oct 2, 2020Updated 5 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Convert boring text to 1337 text☆13Mar 15, 2016Updated 10 years ago
- ☆68Mar 15, 2024Updated 2 years ago
- Multithreaded Host Header Redirection Scanner☆14Nov 10, 2020Updated 5 years ago
- Arduino and Raspberry PI Development Kit☆10Jun 28, 2017Updated 8 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆277Jan 28, 2025Updated last year
- 64-bit version of IDR (not complete, use as is)☆52Dec 30, 2018Updated 7 years ago
- Dynamic Process name change for Android Apps☆28Oct 17, 2020Updated 5 years ago
- 4.9 Kernel Exploit for CVE-2020-27786☆10Dec 3, 2022Updated 3 years ago
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆31Apr 7, 2019Updated 6 years ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- Bhadra is a Vulnerability Management Platform to handle all security issues☆16Mar 2, 2026Updated 2 weeks ago