carnal0wnage / fake_commited_secretsView external linksLinks
A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]
☆10Mar 22, 2018Updated 7 years ago
Alternatives and similar repositories for fake_commited_secrets
Users that are interested in fake_commited_secrets are comparing it to the libraries listed below
Sorting:
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- scripts for pentesting☆86Aug 21, 2018Updated 7 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Nov 15, 2018Updated 7 years ago
- threejs risk-based heatmap☆12Aug 1, 2023Updated 2 years ago
- Get started with gauntlt right away with examples, install scripts and more☆51May 26, 2015Updated 10 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- ☆11Feb 21, 2016Updated 9 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- Python codes to install/configure to master/slave DNS bind and for add new zone or record☆10Apr 2, 2017Updated 8 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Lua Pages Template Preprocessor Extension, enables <?lua@client tag that executes Lua scripts in the browser☆19Oct 1, 2018Updated 7 years ago
- Simple tool to send the json output from HTTPX to BBRF☆11Mar 30, 2023Updated 2 years ago
- A httpbin reimplementation in rust☆10Dec 29, 2018Updated 7 years ago
- Python script to create simple posters, using simple phrases and background images.☆11Mar 19, 2015Updated 10 years ago
- UM1 test programs and sample code☆11Jul 25, 2022Updated 3 years ago
- PowerShell functions, scripts and modules☆15Dec 11, 2016Updated 9 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- [ICML 2025] Official PyTorch implementation of "NegMerge: Sign-Consensual Weight Merging for Machine Unlearning"☆14Nov 25, 2025Updated 2 months ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- Python Certificate Transparency client☆11Feb 8, 2015Updated 11 years ago
- Write great documents with markdown, then execute in the shell.☆10Sep 1, 2017Updated 8 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Some useful tools and scripts☆47Feb 11, 2023Updated 3 years ago
- Bash script to auto install Squid Proxy on both Centos & Ubuntu☆12Sep 19, 2018Updated 7 years ago
- Secure, policy-enforced execution gateway for AI agents. agentsh sits under your agent/tooling—intercepting file, network, and process a…☆24Updated this week
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 6 years ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Supply Chain Query Tool☆13May 25, 2022Updated 3 years ago
- UVNet data acquisition (DAQ). For doing process control or other monitoring.☆18Dec 30, 2020Updated 5 years ago
- 🚀An illustration of blockchain/Crypto technology😃 by: Building our own very simple Cryptocurrency (like Bitcoin)/ smart contracts/ Hot …☆10May 10, 2023Updated 2 years ago
- toolkit repository: command line cheatsheet, operation script and so on.☆14Jul 9, 2023Updated 2 years ago
- ☆14Aug 2, 2018Updated 7 years ago
- ☆11Nov 14, 2022Updated 3 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 4 years ago
- ☆10Apr 1, 2022Updated 3 years ago