☆66Apr 1, 2019Updated 7 years ago
Alternatives and similar repositories for Books
Users that are interested in Books are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple CLI tool to check WebDAV vulnerability☆14Aug 13, 2021Updated 4 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆33Aug 1, 2019Updated 6 years ago
- DataCamp 2020 Reinforcement Learning Workshop - Bogazici University, UGURKAN ATES☆27Nov 8, 2020Updated 5 years ago
- ☆11Jun 10, 2025Updated 10 months ago
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Plugin for NOPing instructions in IDA☆21May 9, 2024Updated last year
- CTF WriteUps by team TWC☆16Jun 3, 2025Updated 10 months ago
- This is an automated tool collection written in Python for vulnerability assessment and exploitation. It also includes solution of SPSE -…☆21Mar 21, 2017Updated 9 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Apr 22, 2022Updated 3 years ago
- ☆12Feb 8, 2023Updated 3 years ago
- ☆11Oct 31, 2021Updated 4 years ago
- ☆11Jul 18, 2022Updated 3 years ago
- https://twitch.com/scottsec adresinde yapılan yayınların arşiv, link ve kaynakların bulunduğu repo☆12Feb 1, 2021Updated 5 years ago
- My set of notes and resources for Microsoft and other exams☆15Oct 20, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- هذا المستودع هي محاولة منا لاثراء المحتوي العربي بخصوص البج بونتي ومايحتويه من انواع ثغرات الي تقنيات مختلفة الي مصادر متعددة☆38Apr 26, 2022Updated 3 years ago
- Port of BaseFlight (with MultiWii 2.3 features) for STM32F4DISCOVERY board + GY-86 (mpu6050 + hmc5883 + ms5611) sensors board☆15Feb 3, 2014Updated 12 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆61Apr 18, 2021Updated 4 years ago
- ☆23Feb 10, 2026Updated 2 months ago
- A static analysis of the NotPetya ransomware☆20Apr 13, 2020Updated 5 years ago
- CEH Practical Exam☆19Dec 29, 2020Updated 5 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Kerberos parser written in rust with nom☆15Nov 24, 2025Updated 4 months ago
- This repository is a place to leave and share notes on Hak5 scripts - credit to the many authors for sharing great content.☆14Nov 27, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Google Dorks and keywords for bug hunters.☆15Aug 16, 2021Updated 4 years ago
- A Python metadata client for Netflix. 🎥☆14Feb 22, 2021Updated 5 years ago
- ☆18Jun 28, 2020Updated 5 years ago
- Simple Repo for me to note down useful techniques, scripts and tools.☆20Nov 28, 2017Updated 8 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 10 months ago
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- This repository is created for personal use and added tools from my blog post.☆14Aug 27, 2023Updated 2 years ago
- Collaborative mindmapping for Android with XMind support☆13Jan 28, 2014Updated 12 years ago
- A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial f…☆19Jun 1, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Elevate your bug bounty game with our treasure trove of FREE resources! 🚀 Dive into a world of expert guides, cheat sheets, and tools to…☆22Oct 19, 2024Updated last year
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆23May 6, 2022Updated 3 years ago
- ☆20May 24, 2021Updated 4 years ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆87May 16, 2022Updated 3 years ago
- This tool was created to automatically send 53 different types of USPS branded boxes, with the maximum quantities to any address (about 5…☆30Nov 6, 2020Updated 5 years ago
- ☆25Jan 15, 2024Updated 2 years ago
- Contains nuclei templates for security testing and POCs.☆17Oct 19, 2024Updated last year