dmarcelinobr / DatasetsLinks
A collection of datasets
☆41Updated 3 years ago
Alternatives and similar repositories for Datasets
Users that are interested in Datasets are comparing it to the libraries listed below
Sorting:
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆71Updated 2 years ago
- Russian Keyboard Registry Script☆115Updated 4 years ago
- Harden your Chrome browser via enterprise policy.☆294Updated 2 years ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆374Updated 4 years ago
- Source to www.draw.io☆98Updated 6 years ago
- edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of …☆51Updated last year
- CURRYFINGER - SNI & Host header spoofing utility.☆109Updated 6 years ago
- Repository demonstrating the Capital One breach on your AWS account☆244Updated 4 years ago
- ☆40Updated last year
- An Open Letter to the OWASP Board☆107Updated 2 years ago
- Let's brute force this hotel's tv.☆82Updated 6 years ago
- A tool to extract useful data from documents☆155Updated last year
- Postman collection for United's internal in-flight wifi api☆45Updated 5 years ago
- OS image for the PiRogue based on Debian 12☆161Updated last year
- Notes regarding CVE-2021-3156: Heap-Based Buffer Overflow in Sudo☆39Updated 4 years ago
- A Passive SSH back-end and scanner.☆104Updated 5 months ago
- Get Your 3D Printed High Security Key☆144Updated 4 years ago
- Automate "airgapped" server proxy with ssh socks proxy☆101Updated 4 years ago
- A research-based pihole list to reduce tracking by Apple and Google☆324Updated 2 years ago
- Ongoing Infosec Deals☆114Updated 2 weeks ago
- Azure as an external process source for psDoom-ng☆87Updated 3 years ago
- Learning Shodan through katas☆467Updated 5 years ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆310Updated 10 months ago
- This is an attempt to footprint all the trackers and profiling attempts used by numerous UK newspapers operating online, papers known for…☆68Updated 5 years ago
- Utility to find AES keys in running processes☆334Updated 2 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆273Updated 4 years ago
- Mike Lindell's cybersymposium files☆48Updated 4 years ago
- Scripts for easy system administration☆42Updated last month
- ☆65Updated 5 years ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Updated 2 months ago