Book for Pentesting format pdf
☆22Mar 25, 2022Updated 4 years ago
Alternatives and similar repositories for Book_Pentesting
Users that are interested in Book_Pentesting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆16Apr 27, 2021Updated 4 years ago
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- Pseudo 3D racing game built with Reprocessing☆12Apr 3, 2024Updated 2 years ago
- How to use Google Maps with Phoenix Live View☆12Jun 10, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆20Feb 23, 2019Updated 7 years ago
- ☆15Aug 8, 2020Updated 5 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 6 years ago
- RekSai 多个工具的功能结合起来,然后自动信息收集,保存结果☆11Nov 10, 2020Updated 5 years ago
- ☆11Jan 17, 2021Updated 5 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆13Aug 8, 2023Updated 2 years ago
- ☆14May 11, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- just a python script for cve-2017-12615☆11Oct 1, 2017Updated 8 years ago
- Lukin CRA and ReScript Template☆17Dec 10, 2020Updated 5 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆13Sep 23, 2019Updated 6 years ago
- ☆15Aug 13, 2021Updated 4 years ago
- Companion code for gRPC article☆14Mar 19, 2020Updated 6 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- CVE-2021-40438 exploit PoC with Docker setup.☆12Oct 24, 2021Updated 4 years ago
- ☆13Sep 2, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- a shared pixel display controllable via TCP☆13Jan 25, 2024Updated 2 years ago
- PIX dashboard☆13Jan 6, 2023Updated 3 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆18Jul 19, 2024Updated last year
- Writing a compiler in Go☆12Aug 24, 2021Updated 4 years ago
- Jane Street's `ppx_let` repackaged for `npm`☆16Sep 7, 2020Updated 5 years ago
- Traveling Salesman Problem Genetic Algorithm Solution☆11Dec 2, 2019Updated 6 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Aug 29, 2020Updated 5 years ago
- ☆21May 19, 2022Updated 3 years ago
- Algebraic Subtyping typechecking algorithms implemented in Erlang☆10Oct 13, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An emulator/debugger/disassembler I made for 8080☆16Nov 17, 2018Updated 7 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 3 years ago
- Network Policy Helper☆30Mar 29, 2026Updated last week
- ☆12Jan 4, 2022Updated 4 years ago
- Some patterns I use while developing LiveView applications☆13Mar 4, 2023Updated 3 years ago