A productivity burp extension which reminds to take break while you are at work!
☆18May 31, 2020Updated 5 years ago
Alternatives and similar repositories for TeaBreak
Users that are interested in TeaBreak are comparing it to the libraries listed below
Sorting:
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆26May 26, 2020Updated 5 years ago
- ☆20Dec 29, 2024Updated last year
- ☆12Jun 15, 2022Updated 3 years ago
- A remote administration tool that uses Twitch Chat as a Command and Control server.☆12Sep 20, 2019Updated 6 years ago
- ☆43Feb 1, 2025Updated last year
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆20Jun 19, 2020Updated 5 years ago
- ☆11Apr 12, 2022Updated 3 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- Google Cloud Platform (GCP) CLI and utils☆14May 6, 2023Updated 2 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆17Aug 9, 2024Updated last year
- Command Line Interface of ViPER Pen Testing tool.☆14Nov 26, 2016Updated 9 years ago
- Learn terraform with openstack provide☆12Dec 20, 2018Updated 7 years ago
- One-click bookmarklet que acha AWS, Azure, Stripe, Firebase, JWT e chaves de alta entropia em qualquer app em 10 segundos☆41Dec 19, 2025Updated 3 months ago
- ☆13Oct 3, 2023Updated 2 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- Translation of the book A Byte of Python to brazilian portuguese☆29May 12, 2016Updated 9 years ago
- Wipe or locate Android device on receipt of signed SMS☆12Jun 15, 2016Updated 9 years ago
- Tool to predict attacker groups from the techniques and software used☆49Aug 4, 2021Updated 4 years ago
- Python-Based Pentesting CLI Tool☆88Nov 22, 2022Updated 3 years ago
- The aim of this repository is to help students prepare for jobs in the Security Domain by consolidating useful resources and summarizing …☆28Feb 6, 2025Updated last year
- Simple Python script for Job scraping☆11Oct 13, 2021Updated 4 years ago
- ☆24Jan 4, 2026Updated 2 months ago
- WIP: Quick and easy way to setup a tor .onion ssh service☆23Jan 29, 2021Updated 5 years ago
- ☆32Oct 21, 2023Updated 2 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- CVE-2024-57727☆14Jan 17, 2025Updated last year
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆45Jun 3, 2024Updated last year
- JavaScript (Node) Call Flooder☆13Mar 11, 2021Updated 5 years ago
- Lookup an IP address to find out which public cloud it originates from☆16Jan 13, 2023Updated 3 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- SRC信息收集聚合☆13May 16, 2020Updated 5 years ago
- Open-source web & API security training platform with curated, modular labs and progress tracking.☆37Mar 12, 2026Updated last week
- DES Encrypter/Decrypter☆20Feb 12, 2017Updated 9 years ago
- ☆46Mar 20, 2021Updated 5 years ago
- ☆11Aug 27, 2020Updated 5 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- 一个为PentestBox添加搜索工具名称功能的py脚本☆13Sep 28, 2020Updated 5 years ago