PMR - PT & VA Management & Reporting is a collaboration platform for pen-testing. PMR Platform is maintained by @SabrySecurity https://sabry.sa
☆12Jun 7, 2023Updated 2 years ago
Alternatives and similar repositories for PMR
Users that are interested in PMR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC exploit code for CVE-2021-26855☆17Mar 9, 2021Updated 5 years ago
- Sudo exploit☆12Oct 15, 2019Updated 6 years ago
- Mainframe bruter and screen automation utility.☆42Sep 28, 2014Updated 11 years ago
- Polite, slim and concurrent web crawler.☆14Nov 29, 2020Updated 5 years ago
- Collection of resources for Industrial control system cybersecurity☆16May 30, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆18Apr 15, 2024Updated last year
- Script to check ModSecurity rules agains some WAF☆12Oct 15, 2018Updated 7 years ago
- Kickstart your career in data science & ML. Build data science skills, learn Python & SQL, analyze & visualize data, build machine learni…☆15Oct 14, 2021Updated 4 years ago
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 4 months ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 3 years ago
- Examples of simple code patterns causing BOF☆14Apr 10, 2020Updated 5 years ago
- ☆14Jun 22, 2022Updated 3 years ago
- ☆28Mar 29, 2022Updated 4 years ago
- DC619/DC858 Mainframe Environment/Lab☆11Dec 9, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Burp Extension that makes it easier to view all script code on a Response.☆17Nov 12, 2023Updated 2 years ago
- ☆10May 25, 2023Updated 2 years ago
- A powershell poc to load and automatically run Certify and Rubeus from memory.☆17Aug 17, 2022Updated 3 years ago
- Hackers Cookbook - Tons of hacker cli recipes ready to search and use when you need them☆44Mar 12, 2026Updated 2 weeks ago
- Presentation slides, blogs, and videos of my conference presentations.☆26Jan 31, 2024Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- public dns server list for dmut project☆18Nov 30, 2023Updated 2 years ago
- FirePrint is a security tool for finding misconfigured Firebase realtime databases in Android or iOS applications.☆22Apr 4, 2024Updated last year
- A framework for BREACH and other compression-based crypto attacks☆14Dec 7, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 8 years ago
- The smart python decompiler.☆17Jul 16, 2012Updated 13 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- ☆15Aug 28, 2014Updated 11 years ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Jun 6, 2021Updated 4 years ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆39Jan 23, 2024Updated 2 years ago
- Random stuff☆19May 28, 2024Updated last year
- Random Code☆25Apr 18, 2011Updated 14 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33May 1, 2022Updated 3 years ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Palestine.☆30Apr 23, 2024Updated last year
- Files from Zeronights presentation.☆28Nov 23, 2012Updated 13 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- An AWS Lambda function that converts any document format that LibreOffice can import to any document format that LibreOffice can export☆25Oct 12, 2023Updated 2 years ago
- Linux Developer Libraries☆12May 8, 2017Updated 8 years ago
- ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.☆12Nov 27, 2025Updated 4 months ago