giorgitchanturidze / style-ubuntu-terminalLinks
This repository provides a guide to customizing the Linux terminal with a modern and visually appealing style. It includes instructions for installing necessary tools such as zsh, oh-my-zsh, pl10k, Dracula theme, Autosuggestions and Syntax Highlighting.
☆26Updated last year
Alternatives and similar repositories for style-ubuntu-terminal
Users that are interested in style-ubuntu-terminal are comparing it to the libraries listed below
Sorting:
- A compilation of CTF problems I've created for various CTFs☆24Updated 2 weeks ago
- A C2 framework inspired by anime, made in python.☆11Updated last year
- Advanced Penetration Testing Framework | Powered by Bash☆31Updated last year
- ☆42Updated 4 years ago
- ☆96Updated 8 months ago
- ☆65Updated last year
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Gh…☆67Updated 4 years ago
- ☆128Updated 2 years ago
- Making your own CTF☆26Updated 4 years ago
- Reverse shell cheat sheet☆29Updated 2 years ago
- A tool for automatically change the Tor IP address over time.☆109Updated 7 months ago
- POC Pdf-exploit builder on C#☆13Updated last year
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆26Updated 2 weeks ago
- Malware attacks/techniques explained☆191Updated 4 months ago
- Brute force attack tool on Mikrotik box credentials exploiting API requests☆63Updated last month
- What the name says....☆101Updated last year
- A list of 350+ free TryHackMe rooms💻 to kick off your cybersecurity learning, organized by topics for easy exploration and practical ski…☆115Updated this week
- CTF WriteUps by team TWC☆16Updated 5 months ago
- A multi web security purposes tool☆44Updated 5 months ago
- PoC for SQL Injection in CVE-2024-27956☆90Updated last year
- ☆23Updated 3 years ago
- ☆13Updated 3 years ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆42Updated 2 years ago
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆58Updated last year
- A simple Reverse Engineering challenge for starter in Reverse Engineering Attack to understand the basic concept of Reverse Engineering &…☆96Updated 11 months ago
- tryhame rooms walkthrough☆36Updated last month
- Learning progress in CyberTalents Blue Team Scholarship 2023. Write-ups, solutions, and notes for challenges & topics. Join my cybersecur…☆25Updated 2 years ago
- this my repo with notes i take in penetration testing☆26Updated last month
- ☆175Updated last month
- My notes from courses,books ..etc☆46Updated last week