☆198Jan 21, 2016Updated 10 years ago
Alternatives and similar repositories for LibTech-Auditing-Cheatsheet
Users that are interested in LibTech-Auditing-Cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆56Jan 25, 2016Updated 10 years ago
- ☆34Aug 5, 2015Updated 10 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- iSEC Partners' research publications☆77Jul 8, 2016Updated 9 years ago
- A simple SMTP Mass mailer program utilising open relays.☆10Aug 1, 2016Updated 9 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- jPurify☆65Feb 16, 2017Updated 9 years ago
- JavaScript parser and sandbox☆80Sep 13, 2016Updated 9 years ago
- Planning for next generation secure chat.☆37Mar 12, 2015Updated 11 years ago
- SSH Based Remote Administration Tool☆102Jul 9, 2015Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Scans crossdomain.xml policies for expired domain names.☆26Aug 4, 2015Updated 10 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- a collection of public domain artwork and graphics, where possible, with source files to help others remix and reuse to make slides, hand…☆30Aug 19, 2018Updated 7 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- HACL*, a formally verified cryptographic library for Rust (binding to hacl-c).☆30Feb 29, 2020Updated 6 years ago
- A multi-codec media fuzzing tool.☆43Oct 9, 2012Updated 13 years ago
- ☆10Jan 14, 2015Updated 11 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Checklists☆16Sep 22, 2016Updated 9 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- ☆40Feb 23, 2016Updated 10 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- tamper resistant audit log☆17Aug 30, 2018Updated 7 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- A dynamic data race detector for programs☆15Jan 2, 2016Updated 10 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- The Digital First Aid Kit has moved to Gitlab:☆111Jul 19, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Custom Scanner for Burp☆31Mar 26, 2014Updated 12 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Jan 30, 2021Updated 5 years ago
- RoR / Devise PoC in memory Backdoor☆29Dec 14, 2014Updated 11 years ago
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆491Oct 3, 2024Updated last year
- Just an experiment with hash cracking :) few password lists along with some good password cracking rule sets.☆13Feb 29, 2020Updated 6 years ago
- My masters degree dissertation for ISG, Royal Holloway (2011) on evolutionary fuzzing☆11Jul 22, 2016Updated 9 years ago