Cheatsheets on security vulnerabilities and exploits.
☆35Jan 20, 2020Updated 6 years ago
Alternatives and similar repositories for Sec-Cheatsheets
Users that are interested in Sec-Cheatsheets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Nov 12, 2019Updated 6 years ago
- Burp plugin to turn requests into curl commands☆16Apr 25, 2014Updated 12 years ago
- All Security Engineering Resources☆15Feb 2, 2018Updated 8 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Async / concurrent HTTP requests for Go☆50Jun 29, 2023Updated 2 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆16Apr 27, 2021Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Jan 22, 2018Updated 8 years ago
- This repository contains some details about abusing outlook.☆27Aug 17, 2018Updated 7 years ago
- CLI tool to get the links of original writeups from ctftime.org☆31Mar 22, 2020Updated 6 years ago
- https://jira.atlassian.com/browse/JRASERVER-69793☆10Sep 16, 2019Updated 6 years ago
- Scripts and tools for AWS Pentest☆53Oct 22, 2020Updated 5 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated last year
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- unbox - Unpack and Decompile the $h*! out of things☆48Mar 28, 2018Updated 8 years ago
- Solutions for ROP Emporium challenges (https://ropemporium.com/) in python.☆37Oct 25, 2017Updated 8 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- Browser Fuzzing with Machine Learning☆22Mar 6, 2019Updated 7 years ago
- BurpSuite dockerized☆11Mar 2, 2018Updated 8 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- A proof of concept to dump Django website's source code affected by NGINX's off-by-slash alias directive misconfiguration.☆23Dec 8, 2022Updated 3 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- encrypted-linux-kernel-modules☆12Nov 4, 2020Updated 5 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- My dotfiles for Linux boxes☆58Updated this week
- Automating the boring stego work for you..☆13Feb 26, 2019Updated 7 years ago
- Python setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆131Oct 28, 2024Updated last year
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆157Aug 26, 2020Updated 5 years ago
- ☆19Apr 29, 2015Updated 11 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆11Dec 20, 2015Updated 10 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆11Mar 19, 2019Updated 7 years ago
- A VM for RE and Pwn☆25May 17, 2024Updated last year
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- create customized .onion addresses for your hidden service,make shallot and eschalot tools☆13Jan 18, 2022Updated 4 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.3☆12Jan 23, 2020Updated 6 years ago
- Robson is a simple LKM rootkit that uses the Linux kernel's kprobes tracing feature as a hooking mechanism.☆13Feb 16, 2023Updated 3 years ago
- 403 Bypasser With auto payload generation☆12Aug 8, 2024Updated last year