Framework for rapid development of offensive security tools
☆112Mar 22, 2026Updated this week
Alternatives and similar repositories for spellbook
Users that are interested in spellbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My past public researches are archived here☆20Updated this week
- [W.I.P] An ecosystem of crawlers for detecting: leaks, sensitive data exposure and attempts exfiltration of data☆32Updated this week
- HTTP fuzzer engine security oriented☆60Updated this week
- Differential Fuzzer to hunt for logic bugs on Perl Modules☆26Updated this week
- Repositorio dedicado á comunidade de Programadores Perl do Brasil, aqui você encontrará links para materias e muito mais.☆45Mar 23, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Simple and pratical security gate for Github Security Alerts☆19Updated this week
- A lightweight static security analysis tool for modern Perl Apps☆56Updated this week
- This is just a repository of a developer noob.☆17Mar 10, 2018Updated 8 years ago
- This program focuses on automating the download, installation and compilation of pentest tools from source☆33Oct 30, 2018Updated 7 years ago
- Collaborative repository to catalogue insecure functions in various programming languages.☆11May 9, 2022Updated 3 years ago
- Lock user screen every time the flash drive is unplugged. Creating a two-step authentication on the machine☆16Nov 20, 2018Updated 7 years ago
- Monitor websites for changes☆29Updated this week
- Linguagem de programação moderna em portugues, baseada em JS☆37May 22, 2019Updated 6 years ago
- Mapa contendo as barragens brasileiras.☆63Dec 10, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- 🥊Choose your favorite programming languages☆22May 7, 2018Updated 7 years ago
- Script in Perl for Bypass CloudFlare [DEPRECATED]☆13Oct 26, 2016Updated 9 years ago
- O Saia de Casa! é um projeto colaborativo, e tem como principal ideia manter um calendário central de eventos, onde qualquer um possa, (v…☆170Dec 9, 2022Updated 3 years ago
- Word List (Palavras) para testes de intrusão focados no mercado BR☆10May 6, 2025Updated 10 months ago
- Writeup for HackerOne H1-415 2020 CTF☆32Feb 3, 2020Updated 6 years ago
- ☆96Apr 13, 2024Updated last year
- Insecure Deserialization, PDF and lab☆18Nov 19, 2019Updated 6 years ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆14Jul 3, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- BurpSuite extension to convert requests into bcheck scripts☆33Jul 18, 2023Updated 2 years ago
- A book. About Perl. And the Web.☆53Dec 28, 2015Updated 10 years ago
- Internet speed checker for brazilian people☆31Feb 11, 2024Updated 2 years ago
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆94May 20, 2021Updated 4 years ago
- Back, back, back in time... before there were fancy schmanzy web GUIs... along came SATAN.☆13Jul 10, 2015Updated 10 years ago
- ☆46Mar 10, 2016Updated 10 years ago
- allperlbooks.com data☆10Oct 20, 2024Updated last year
- Crypt::Curve25519☆12Jan 6, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Atomic grid based in flexbox. Mobile first.☆12Jul 4, 2019Updated 6 years ago
- Simple IRC Bot for flooding☆11Sep 12, 2011Updated 14 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- ☆12Jul 30, 2018Updated 7 years ago
- huntr.dev public disclosures/hacktivity watcher☆17Nov 5, 2023Updated 2 years ago
- An Introduction to Mojolicious By Example☆10Sep 9, 2020Updated 5 years ago
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆11Apr 9, 2021Updated 4 years ago