istvanbohm / nahamcon2023View external linksLinks
☆13Jun 15, 2023Updated 2 years ago
Alternatives and similar repositories for nahamcon2023
Users that are interested in nahamcon2023 are comparing it to the libraries listed below
Sorting:
- ☆10Aug 4, 2020Updated 5 years ago
- Collection of CTFs for Fun and Interviewing Applicants☆152Feb 10, 2025Updated last year
- Super good awesome☆10Jan 15, 2023Updated 3 years ago
- Monitor your study sessions, log your study hours, set goals, and watch your productivity progress.☆10May 19, 2024Updated last year
- ☆11Sep 14, 2020Updated 5 years ago
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆23Sep 13, 2025Updated 5 months ago
- The standard ADB Configuration involves a USB Connection to a physical Device. If you prefer, you can switch over to TCP/IP Mode and conn…☆17Nov 4, 2023Updated 2 years ago
- Application Security Mind Maps☆10Apr 10, 2021Updated 4 years ago
- ☆12Feb 7, 2023Updated 3 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- ☆19Jul 23, 2025Updated 6 months ago
- DNA-based End-to-End Encrypted EFS Database created using Python 🧬☆11Dec 21, 2023Updated 2 years ago
- Simple PoC package for testing for dependency confusion vulnerabilities.☆10Feb 9, 2021Updated 5 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- ☆14Dec 24, 2025Updated last month
- ☆14Jan 8, 2026Updated last month
- ☆12Jun 4, 2025Updated 8 months ago
- Terraform module to perform security assessment in AWS Organizations using Prowler on AWS Fargate.☆15Oct 5, 2023Updated 2 years ago
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Nov 26, 2022Updated 3 years ago
- ☆13Jan 12, 2026Updated last month
- ☆11Oct 25, 2021Updated 4 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Cheat Sheet for IEC 104☆18May 23, 2022Updated 3 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Jun 23, 2021Updated 4 years ago
- Exploit for Microsoft SharePoint 2019☆13Dec 28, 2023Updated 2 years ago
- IIS shortname scanner + bruteforce☆54Feb 18, 2024Updated last year
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 5 months ago
- Various scripts I've built for CTFs, hacking challenges, and for learning how various existing tools work☆17Mar 21, 2023Updated 2 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆16Jun 9, 2023Updated 2 years ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆63Oct 16, 2024Updated last year
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- ☆17Nov 2, 2022Updated 3 years ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Jan 15, 2024Updated 2 years ago
- A PoC executing shellcode in Dart☆17Jun 28, 2022Updated 3 years ago
- Preparation of Attack & Defense CTF for iHack 2022☆16Nov 28, 2023Updated 2 years ago
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆17Mar 20, 2023Updated 2 years ago
- Just simple log4j scanner☆12Dec 13, 2021Updated 4 years ago
- XSS vulnerability scanner written in Python☆16Oct 28, 2022Updated 3 years ago