☆22Jun 28, 2016Updated 9 years ago
Alternatives and similar repositories for Writing-Your-First-Exploit
Users that are interested in Writing-Your-First-Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of linux sysadmin/devop interview questions☆18Aug 21, 2015Updated 10 years ago
- openvpn server configs☆15May 12, 2016Updated 9 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- Penetration Testing/Security Cheatsheets☆65Oct 31, 2015Updated 10 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Use Tor for anonymous scanning with nmap☆95Jun 19, 2015Updated 10 years ago
- your offsec knowledge☆486Oct 9, 2019Updated 6 years ago
- A curated list of awesome infosec resources.☆32May 31, 2015Updated 10 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- just for fun ¯\_(ツ)_/¯☆281Sep 21, 2016Updated 9 years ago
- site source jivoi.github.io☆23Nov 7, 2022Updated 3 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- VAMPY - Minimal tool for RAM dumping.☆10Jul 1, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- CTFs as you need them☆30May 3, 2023Updated 2 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- Issues to consider when planning a red team exercise.☆15Aug 22, 2017Updated 8 years ago
- A git submodule list containing all the tools repo's you'll ever need.☆27May 22, 2019Updated 6 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 7 months ago
- My Collection of x64 Assembly programs with NASM☆20Oct 21, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Hello and welcome to my GitHub account. If you'd like to know more about me, this is likely the best place to start☆16Oct 4, 2017Updated 8 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Combines the speed of masscan with the reliability and detailed enumeration of nmap☆17Aug 16, 2017Updated 8 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 6 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Python script for extracting and decrypting Group Policy Preferences passwords☆26May 28, 2021Updated 4 years ago
- ☆11Sep 15, 2020Updated 5 years ago
- Try Open WebUI on the Cloud!☆13Jan 3, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- CVE-2017-5005 for Quick Heal Antivirus☆16Mar 31, 2017Updated 9 years ago
- A list of GitHub accounts that you will find useful for OSINT.☆47Oct 12, 2025Updated 6 months ago
- A shell script for running lightning talks with a cow as a compere.☆15Jun 5, 2020Updated 5 years ago
- A static website template for security pages.☆19Jun 29, 2018Updated 7 years ago
- offsec batteries included☆1,612Mar 11, 2024Updated 2 years ago
- ☆18Feb 16, 2024Updated 2 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bucrowd LevelUp 2017 virtua…☆25Jul 15, 2017Updated 8 years ago