☆81Jul 10, 2022Updated 3 years ago
Alternatives and similar repositories for Python1
Users that are interested in Python1 are comparing it to the libraries listed below
Sorting:
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- ☆20Mar 5, 2022Updated 4 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- ☆24Feb 7, 2025Updated last year
- This repository will contain My Computer Vision Project, plus their tutorial on youtube and source code.☆13Nov 29, 2025Updated 3 months ago
- scripts & notes☆13Nov 4, 2019Updated 6 years ago
- ☆16Oct 18, 2024Updated last year
- I collected it to help the bug hunter get a reward☆57Sep 7, 2022Updated 3 years ago
- ☆19Mar 4, 2023Updated 3 years ago
- 1000 black hat tools Collected From github☆16Nov 28, 2019Updated 6 years ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 2 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- ☆18Mar 26, 2024Updated last year
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- ☆20Sep 24, 2025Updated 5 months ago
- 📚A curated list of product security resources.☆23Jun 11, 2025Updated 8 months ago
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- MSDGen: Generater for microservice demos of any given size and connectivity constraints.☆22Nov 26, 2023Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Mar 31, 2022Updated 3 years ago
- ☆64May 1, 2022Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- Nuclei template and information about the POC for CVE-2024-25600☆31Feb 21, 2024Updated 2 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- M365 Defender SOC Playbooks☆24Feb 6, 2023Updated 3 years ago
- vulnlab.com reaper writeup☆27Aug 30, 2023Updated 2 years ago
- An x64dbg plugin which marks XFG call signatures as data☆79May 12, 2023Updated 2 years ago
- ☆25Jan 11, 2023Updated 3 years ago
- ☆33Apr 23, 2023Updated 2 years ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- XSSMaze is a web service designed to test and improve the performance of security testing tools by providing various cases of XSS vulnera…☆31Feb 8, 2026Updated 3 weeks ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago