j4k0m / really-good-cybersecLinks
A really good cybersec reading materials.
☆13Updated 3 years ago
Alternatives and similar repositories for really-good-cybersec
Users that are interested in really-good-cybersec are comparing it to the libraries listed below
Sorting:
- SecDojo 23jan CTF writeup.☆15Updated 3 years ago
- ☆14Updated 2 years ago
- CTF Writeups☆59Updated last year
- The Hack3r News B'darija☆18Updated 2 years ago
- My attempt to reverse the Discord nitro token generation function.☆29Updated last year
- Akasec's CTF Writeups archive☆13Updated 3 years ago
- Config file of my Github profile that comes as a description about Me, My Studies as well as the projects That I do☆18Updated 6 months ago
- Collection of hacking tools, and ideas you might need to practice ethical hacking.☆31Updated 3 years ago
- Open Redirect scanner☆18Updated 3 years ago
- A potent tool designed for efficiently cracking MD5 hashes using an online wordlist. This repository provides a robust solution for secur…☆13Updated last year
- This tool is a versatile implementation of the Affine Cipher, a classical encryption algorithm that combines modular arithmetic and linea…☆23Updated last year
- Osint French People Location☆15Updated 2 years ago
- Vulnerabilities you my miss during a penetration testing.☆98Updated last year
- i implemented public key cryptosystem, based of RSA algorithme .☆12Updated 3 years ago
- POC for CVE-2021-41091☆65Updated 2 years ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆65Updated last year
- Piscine 1337 futureisloading-Juillet 2018☆27Updated 7 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Updated last year
- Cyber Odyssey 2024 : Qualifications Challenges.☆13Updated last year
- Python based WinDbg script to automate the search for code caves in binaries and libraries.☆52Updated 10 months ago
- ORDER - A small Python web-app to practice blind SQLi in order by☆20Updated 4 years ago
- This tool allows to automatically test for Content Security Policy bypass payloads.☆43Updated last year
- Stack Based buffer overflow attack☆19Updated 2 years ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆61Updated 3 years ago
- Simple Assault cube external hack written in C☆13Updated 4 years ago
- ☆62Updated 3 years ago
- Helper script for identifying bad characters based on (Immunity|edb)'s stack dump☆13Updated 2 years ago
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆76Updated 2 years ago
- Offensive Security OSWE Prep 2022☆75Updated 3 years ago
- Basic reverse shell in C using socket() with complete explanation☆67Updated 2 years ago