General Work Notes. These are often paper-notes, converted ... I have a lot of paper.
☆59Mar 4, 2026Updated this week
Alternatives and similar repositories for work-notes
Users that are interested in work-notes are comparing it to the libraries listed below
Sorting:
- Learn how to connect raspberry pi to laptop wirelessly. Share your raspberry pi screen on laptop and control it with laptop mouse and key…☆11Jul 4, 2021Updated 4 years ago
- Starter Projects for the Docker Course☆11Dec 25, 2025Updated 2 months ago
- OWASP Coimbatore's Web & Project Repository☆13Jan 23, 2026Updated last month
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- pptx2txt is a tool that converts PowerPoint .pptx format to text.☆13Updated this week
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- Training and certifications related to secure software development☆11Feb 9, 2026Updated 3 weeks ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- A playground website to learn how different parts of the scrollbar UI can be customized☆11Jun 15, 2025Updated 8 months ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- ☆15Jul 3, 2025Updated 8 months ago
- Save image from your clipboard 📋 as an image file directly from your command line! 🔥☆16Jul 12, 2024Updated last year
- ☆20Jan 12, 2022Updated 4 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- ☆10May 6, 2017Updated 8 years ago
- automation framework powered by headless chrome☆11Jul 20, 2019Updated 6 years ago
- A zero dependency class schedule manager.☆10Jan 7, 2023Updated 3 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- ☆11Jan 14, 2026Updated last month
- Transform CSS path() values to responsively fit a container☆11Jun 16, 2024Updated last year
- Source code related of the articles posted in medium.com☆12Nov 2, 2020Updated 5 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- Hashnode blogpost cards for your website☆13Sep 12, 2025Updated 5 months ago
- Lab Material for the One-Day Web Application Penetration Testing Fundamentals Course☆10Jun 22, 2021Updated 4 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Collection of resources for responding to the Log4j set of vulnerabilities.☆11Feb 22, 2022Updated 4 years ago
- A lightweight dockerized version of the AWS CLI☆49Updated this week
- This is an inventory system TUI app written in Golang with tview package (it's an awesome app!)☆16Oct 25, 2024Updated last year
- 📰 Hacker News CUI Client made with go.☆17Mar 15, 2020Updated 5 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- Bootstrapping setup for participants☆10Dec 29, 2021Updated 4 years ago
- Curated list of useful resources for this quarantine days☆13Mar 17, 2023Updated 2 years ago
- ☆12Aug 5, 2023Updated 2 years ago
- security related events, tools, tutorials, cheatsheets, and more.☆11Oct 20, 2015Updated 10 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Here you will find information and examples about the most known vulnerabilities in the Bug Bounty world! [ EN ESPAÑOL ]☆14Oct 23, 2021Updated 4 years ago