A large repository of links spanning all topics in information security.
☆13Mar 18, 2016Updated 10 years ago
Alternatives and similar repositories for BigSecList
Users that are interested in BigSecList are comparing it to the libraries listed below
Sorting:
- CVE-2017-5005 for Quick Heal Antivirus☆15Mar 31, 2017Updated 8 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- Proof of concept of VMSA-2017-0012☆41Jul 27, 2017Updated 8 years ago
- ☆21Apr 15, 2016Updated 9 years ago
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated 2 months ago
- Storage for the IOCs I collect☆11Mar 26, 2025Updated 11 months ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆45Updated this week
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 7 months ago
- ☆10Apr 8, 2018Updated 7 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- Ingest Nessus files into Elasticsearch using PowerShell!☆19Nov 14, 2025Updated 4 months ago
- My Notes from Hugging Face AI Agents Course☆20Feb 18, 2025Updated last year
- salt state definitions for installing logstash, elasticsearch and kibana☆36Aug 6, 2013Updated 12 years ago
- CVE-2019-18890 POC (Proof of Concept)☆10Jan 6, 2020Updated 6 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- A Splunk technology add-on for osquery☆14Sep 5, 2025Updated 6 months ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆15Jun 6, 2019Updated 6 years ago
- ☆10Jan 26, 2016Updated 10 years ago
- vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana☆41Nov 24, 2014Updated 11 years ago
- Assignments for the cryptography engineering course☆12Dec 17, 2013Updated 12 years ago
- 2018年初整理的一些内网渗透TIPS,后面更新的慢,所以公开出来希望跟小伙伴们一起更新维护~☆20Jan 21, 2022Updated 4 years ago
- Extract cookies from Chrome, Chromium or Firefox sqlite cookie stores into a wget-compatible cookies.txt file☆19Feb 7, 2021Updated 5 years ago
- CVE-2020-10199 CVE-2020-10204 Python POC☆19Apr 7, 2020Updated 5 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Utility scripts for working with Fortigate FortiOS configuration files offline or via the API.☆15Oct 27, 2022Updated 3 years ago
- CVE-2016-3141☆15Apr 23, 2016Updated 9 years ago
- Tools to decrypt Google Chrome, Mozilla Firefox and Microsoft Edge login/password information.☆17Apr 10, 2023Updated 2 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆52Sep 20, 2017Updated 8 years ago
- ☆10Mar 30, 2020Updated 5 years ago
- Docker setup for Pupy☆28Jul 23, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- Skills To Improve Before Heading to OSCP☆15May 14, 2017Updated 8 years ago