random notes
☆47Jul 9, 2025Updated 7 months ago
Alternatives and similar repositories for notes
Users that are interested in notes are comparing it to the libraries listed below
Sorting:
- Security Related Tools and Resources☆16Aug 10, 2017Updated 8 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Jan 17, 2018Updated 8 years ago
- Tooling and commands for common red team and Infrastructure testing tasks☆43Nov 16, 2022Updated 3 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- ☆34Feb 15, 2021Updated 5 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- ☆29Dec 13, 2023Updated 2 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Feb 18, 2021Updated 5 years ago
- Extract domains/subdomains/FQDNs from files and URLs☆19Jun 30, 2020Updated 5 years ago
- ☆17May 29, 2015Updated 10 years ago
- Tool to help identify timing attacks☆70Sep 4, 2011Updated 14 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- Browser extension that finds HTML comments.☆12Aug 8, 2024Updated last year
- There is my vuln POC and EXP. Some of POC were collected, most of POC and EXP were written by myself.☆13May 28, 2022Updated 3 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- oneliner is a tool that gives a list of compatible reverse-shell-string oneliners☆24Jul 30, 2016Updated 9 years ago
- Horizontal Domain Discovery☆77May 22, 2023Updated 2 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- Get a roadmap and never get lost again.☆15Oct 3, 2024Updated last year
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 5 years ago
- Blind XSS service alerting over slack or email☆29Aug 6, 2019Updated 6 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- ☆53Dec 3, 2025Updated 2 months ago
- ☆27Mar 18, 2020Updated 5 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Jul 6, 2022Updated 3 years ago
- ☆12Jan 4, 2022Updated 4 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- WebApp for BugBounty Hunters☆14Mar 24, 2017Updated 8 years ago
- ☆31Apr 6, 2021Updated 4 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- tmp files from tmp notes as tmp-pocs... ;)☆16Jun 3, 2022Updated 3 years ago
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- My gfPatterns☆15Aug 31, 2021Updated 4 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆17Jun 3, 2022Updated 3 years ago