firdauskhairuddin / lekirView external linksLinks
LEKIR - Vulnerable by design to help people learn about common web security
☆29Jul 16, 2025Updated 6 months ago
Alternatives and similar repositories for lekir
Users that are interested in lekir are comparing it to the libraries listed below
Sorting:
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- Offensive Security & Red Teaming Labs and Projects☆25Aug 26, 2025Updated 5 months ago
- Materials from the previous MCC trainers☆18Jan 16, 2026Updated 3 weeks ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 8 years ago
- ⚡️ ShellCat is a Reverse Shell Manager☆33Sep 7, 2018Updated 7 years ago
- Iptv tv películas cine series streaming multimedia☆11Feb 3, 2026Updated last week
- A tool for analyzing vulnerabilities in JWT tokens. Advanced JWT Vulnerability Scanner & Exploitation Toolkit☆45Nov 24, 2025Updated 2 months ago
- DoS PoC's for SAP products☆51Jan 23, 2018Updated 8 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- ☆10Oct 8, 2015Updated 10 years ago
- Lista iptv 2024☆11Jun 30, 2025Updated 7 months ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- MacOS Big Sur Sharing Host VPN with Guest☆14May 5, 2021Updated 4 years ago
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆15Nov 7, 2021Updated 4 years ago
- ☆10Jun 13, 2014Updated 11 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- Pop Os dotfiles☆10Mar 18, 2023Updated 2 years ago
- ☆19Updated this week
- A toolkit for CTF challenges☆10Jan 18, 2017Updated 9 years ago
- Polymer component that allows uploading of images and pdf files☆11Sep 12, 2018Updated 7 years ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 3 years ago
- A collection of high-performance, modular utilities for enhancing testing, transactional consistency, efficiency, security and stability …☆28Jan 26, 2026Updated 2 weeks ago
- Config files for my GitHub profile.☆19Feb 4, 2026Updated last week
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- Reverse HTTP shell with basic ARC4 encryption support☆12Dec 28, 2015Updated 10 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- This repository is a part of GSoC Project 2019 which intends to add the macOS support for Cuckoo Sandbox. This repository helps setting u…☆11Aug 26, 2019Updated 6 years ago
- A node.js alternative for Varnish Cache☆10Feb 16, 2016Updated 9 years ago
- ☆10May 1, 2020Updated 5 years ago
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- ☆16Feb 6, 2026Updated last week
- Docker for CentOS Weblogic with domain☆12Jun 22, 2017Updated 8 years ago
- ☆10Mar 30, 2015Updated 10 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- AEA metadata dumper☆49May 15, 2025Updated 8 months ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 5 years ago