A large repository of links spanning all topics in information security.
☆13Mar 18, 2016Updated 9 years ago
Alternatives and similar repositories for BigSecList
Users that are interested in BigSecList are comparing it to the libraries listed below
Sorting:
- CVE-2017-5005 for Quick Heal Antivirus☆15Mar 31, 2017Updated 8 years ago
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated last month
- Ingest Nessus files into Elasticsearch using PowerShell!☆17Nov 14, 2025Updated 3 months ago
- ☆53Jul 9, 2013Updated 12 years ago
- CVE-2020-2555☆14Mar 10, 2020Updated 5 years ago
- Azure Offensive Library☆17Oct 18, 2025Updated 4 months ago
- ☆10Apr 8, 2018Updated 7 years ago
- ☆10Dec 15, 2023Updated 2 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 7 months ago
- ELK Stack (Elasticsearch, Logstash & Kibana)☆13Jul 31, 2020Updated 5 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- salt state definitions for installing logstash, elasticsearch and kibana☆36Aug 6, 2013Updated 12 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- Small tool to run reverse IP lookup for given IP, IP range or IP list☆13Jan 2, 2020Updated 6 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Aug 26, 2024Updated last year
- To run Burpsuite from launcher, You may run it in terminal by script, But by this tool you will able to run it from Launcher with a Burp …☆11Sep 24, 2023Updated 2 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- Miscellaneous JScript, VBScript, WSF XML, HTA HTML, PowerShell, Batch, etc. for Windows☆15Oct 30, 2017Updated 8 years ago
- ☆14Mar 30, 2022Updated 3 years ago
- Dockerfile for building a docker image able to run the UrbanTerror game server☆11Oct 31, 2018Updated 7 years ago
- Utility scripts for working with Fortigate FortiOS configuration files offline or via the API.☆15Oct 27, 2022Updated 3 years ago
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- Juniper Junos Space (CVE-2020-1611) (PoC)☆29Jan 22, 2020Updated 6 years ago
- ☆11Jun 4, 2019Updated 6 years ago
- Jinja Template - Black Dashboard | AppSeed☆12May 3, 2025Updated 9 months ago
- ☆16Jan 2, 2025Updated last year
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- ☆27Nov 21, 2017Updated 8 years ago
- Vuln-dev environment for LuaJIT☆20Dec 30, 2022Updated 3 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆53Sep 19, 2023Updated 2 years ago
- Powershell Script to enumerate AzureAD and output good data☆14Nov 8, 2023Updated 2 years ago
- Take a list of IP addresses and probe for working HTTP and HTTPS servers☆12Mar 12, 2020Updated 5 years ago
- This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are plan…☆15Feb 9, 2019Updated 7 years ago
- ☆10Jan 26, 2016Updated 10 years ago
- Tiny bengali ponjika based on Gregorian date☆12Apr 18, 2018Updated 7 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago