PMR - PT & VA Management & Reporting is a collaboration platform for pen-testing. PMR Platform is maintained by @SabrySecurity https://sabry.sa
☆12Jun 7, 2023Updated 2 years ago
Alternatives and similar repositories for PMR
Users that are interested in PMR are comparing it to the libraries listed below
Sorting:
- Linux Developer Libraries☆12May 8, 2017Updated 8 years ago
- CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发☆15Nov 1, 2022Updated 3 years ago
- A cross-platform, GPU-accelerated terminal emulator (debian packaging fork)☆11Aug 13, 2024Updated last year
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 8 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- Challenges from CSAW 2019 Pwn Race Edition☆12Nov 8, 2019Updated 6 years ago
- 3.60 module dump☆10Aug 26, 2016Updated 9 years ago
- ☆10May 25, 2023Updated 2 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆19Dec 3, 2024Updated last year
- ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.☆12Nov 27, 2025Updated 3 months ago
- ☆13Jan 11, 2024Updated 2 years ago
- DC619/DC858 Mainframe Environment/Lab☆11Dec 9, 2021Updated 4 years ago
- Examples of simple code patterns causing BOF☆14Apr 10, 2020Updated 5 years ago
- CVE-2021-21975 vRealize Operations Manager SSRF☆13Mar 31, 2021Updated 4 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- Exploits for Dell EMC RecoverPoint enterprise data protection platform☆13Jun 22, 2018Updated 7 years ago
- Lutech TMS EHAT-NG☆13Jul 8, 2017Updated 8 years ago
- ☆14Jun 22, 2022Updated 3 years ago
- ☆18Aug 1, 2022Updated 3 years ago
- ☆17Jun 17, 2022Updated 3 years ago
- Frida plugin for Binary Ninja☆20Jan 12, 2025Updated last year
- Damn Vulnerable ElectronJS App (DVEA)☆17Feb 12, 2026Updated 3 weeks ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 2 years ago
- ☆12Oct 7, 2019Updated 6 years ago
- A Burp Extension that makes it easier to view all script code on a Response.☆17Nov 12, 2023Updated 2 years ago
- Cracking 2DES using a meet-in-the-middle attack implemented in python 3.☆15Sep 27, 2015Updated 10 years ago
- A minimalistic (< 2100 lines of C) but powerful (hex/ASCII, insert/replace/delete, copy/paste, undo/redo, search, colors, vim-inspired co…☆13Jan 2, 2018Updated 8 years ago
- The smart python decompiler.☆17Jul 16, 2012Updated 13 years ago
- my logstash grok patterns☆17Mar 28, 2023Updated 2 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- FirePrint is a security tool for finding misconfigured Firebase realtime databases in Android or iOS applications.☆22Apr 4, 2024Updated last year
- Security challenges and CTFs created by the Penultimate team.☆13Feb 22, 2018Updated 8 years ago
- Find Cve Exploits/POC from github☆17Jul 6, 2021Updated 4 years ago
- ☆20May 1, 2024Updated last year
- ☆18Jan 9, 2026Updated 2 months ago
- The cleanest and easiest way of doing unattended Debian or Ubuntu installs!☆33Feb 5, 2019Updated 7 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Jun 6, 2021Updated 4 years ago