☆22Oct 30, 2022Updated 3 years ago
Alternatives and similar repositories for Infosec-PPTs
Users that are interested in Infosec-PPTs are comparing it to the libraries listed below
Sorting:
- ☆16Jun 7, 2020Updated 5 years ago
- ☆72Oct 28, 2020Updated 5 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- Wrapper for blocksec2go allowing easy hardware-based signing of Ethereum transactions☆12Feb 8, 2023Updated 3 years ago
- ☆26Feb 28, 2023Updated 3 years ago
- ☆38Feb 5, 2023Updated 3 years ago
- Detections for CVE-2021-44228 inside of nested binaries☆35Dec 18, 2021Updated 4 years ago
- Mind-Maps of Several Things☆12Dec 22, 2021Updated 4 years ago
- ☆13Mar 28, 2024Updated last year
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- My curated list of resources for OSCP preperation☆261Nov 13, 2023Updated 2 years ago
- Turn your Raspberry Pi Pico into a hacking device☆13Mar 7, 2024Updated last year
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- Authorization-Nuclei-Templates☆39Sep 16, 2024Updated last year
- Limits asset outflows from contracts within customisable timeframes☆11May 7, 2022Updated 3 years ago
- Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.☆10Jan 7, 2023Updated 3 years ago
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago
- Solidity smart contract for atomic swaps.☆10Oct 31, 2022Updated 3 years ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 2 years ago
- SSRF (Server Side Request Forgery) testing resources☆12Sep 7, 2017Updated 8 years ago
- Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)☆11Apr 15, 2022Updated 3 years ago
- 🎉 Happy 4th anniversary to the ResetHacker community! 🎉☆11Aug 8, 2024Updated last year
- Sniper. Passive Secrets Hunting.🚬☆13Jun 3, 2022Updated 3 years ago
- deBridge security audits☆14Dec 30, 2024Updated last year
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- ☆15Aug 27, 2020Updated 5 years ago
- ☆12Mar 28, 2022Updated 3 years ago
- ☆12Aug 29, 2021Updated 4 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆16Jun 9, 2023Updated 2 years ago
- Pemrograman bahasa python untuk pemula, dan untuk memahami konsep dari algoritma pemrograman. Note: Materi mata kuliah algoritma & pemrog…☆19Dec 16, 2021Updated 4 years ago
- ☆10Sep 7, 2022Updated 3 years ago
- Solidity Preprocessor☆14Oct 10, 2018Updated 7 years ago
- Khonsu is a powerful port scanning tool written in python that detect open ports with concurrent and accurately☆15Oct 8, 2025Updated 4 months ago
- ☆13Jan 11, 2024Updated 2 years ago
- A curated list of Decentralized Exchange, Decentralized Exchange Protocol and Wallet resources for developers☆11Oct 21, 2018Updated 7 years ago
- A tree-sitter-grammar for cairo 1.0☆16Dec 14, 2022Updated 3 years ago