Collection of my slide decks, conference videos and research white papers
☆27Sep 23, 2025Updated 5 months ago
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Collection of Some Good research Documentation☆27Dec 10, 2017Updated 8 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- This repository is about Learn | Hack | Share | Repeat.☆11Dec 26, 2022Updated 3 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- Just simple log4j scanner☆12Dec 13, 2021Updated 4 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- Small tool to log HTTP requests for debugging.☆16May 9, 2020Updated 5 years ago
- Here, have some candy. Useful tools and cheat sheet for Captures The Flag (CTF) contests. And also for Computer Security in general.☆68Dec 24, 2018Updated 7 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Mar 20, 2017Updated 8 years ago
- Python-based static analyzer for Android APKs that extracts attack surface and flags high-risk vulnerability patterns with lightweight ta…☆49Feb 22, 2026Updated last week
- Script for Reconnaissance(Bug Bounty)☆18May 15, 2022Updated 3 years ago
- HackToday is annual ctf competition held by Cyber Security IPB☆17Mar 19, 2021Updated 4 years ago
- RPJiOS: RPJ's RPi OS, a sensor data platform for the Raspberry Pi built with python2.7 and redis.☆25Mar 31, 2023Updated 2 years ago
- Find CVEs that don't have a Detectify modules.☆22Mar 28, 2023Updated 2 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- Burp Suite extension to log GraphQL operations as a comment☆23Aug 9, 2021Updated 4 years ago
- Minimalist cheat sheet for developpers to write secure code☆54Jul 17, 2020Updated 5 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Learning about disassembling☆20Oct 28, 2019Updated 6 years ago
- Pour nos write ups de CTF ou Rhacklettes party☆23May 6, 2019Updated 6 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole☆27May 10, 2020Updated 5 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆118Jun 17, 2023Updated 2 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- A testing Red Team Infrastructure created with Docker☆32Apr 5, 2022Updated 3 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Sep 21, 2020Updated 5 years ago
- ☆34Feb 15, 2021Updated 5 years ago
- Network penetration testing toolset wrapper☆81Jul 5, 2022Updated 3 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- ☆102May 5, 2020Updated 5 years ago
- Open Redirect scanner - (out of date)☆28Nov 27, 2022Updated 3 years ago
- Penetration Test Vulnerabilities Manager is an extension for Burp Suite, written in Jython. It was developed by Barak Tawily in order to …☆31Jul 25, 2021Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Feb 21, 2023Updated 3 years ago
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆30Sep 16, 2021Updated 4 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Jan 22, 2022Updated 4 years ago