jivoi / ossuLinks
open source society university
☆23Updated 8 years ago
Alternatives and similar repositories for ossu
Users that are interested in ossu are comparing it to the libraries listed below
Sorting:
- cool dockerfiles☆13Updated 9 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆15Updated 3 years ago
- openvpn server configs☆14Updated 9 years ago
- how-to monitor Docker hosts☆10Updated 8 years ago
- gitbook of all pentesting knowledge☆20Updated 2 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆14Updated 2 years ago
- buffer overflow examples☆22Updated 7 years ago
- site source jivoi.github.io☆22Updated 2 years ago
- home! sweet home☆23Updated 5 years ago
- A curated list of GPT agents for cybersecurity☆9Updated 8 months ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Updated 3 years ago
- ☆21Updated 8 years ago
- A large colletion of OSINT tools tailored for investigations within Canada.☆14Updated 10 months ago
- Yet another powerful payload encoder/decoder☆13Updated 3 years ago
- roadmap for being a self-taught hacker☆7Updated last year
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆11Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated 3 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago
- A formula to calculate bounty amounts.☆14Updated 7 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Payloads and Lists☆22Updated 5 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 5 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- It is a script written in Python that performs brute force on workers' payroll files through the use of their DNI (National Identity Docu…☆12Updated 4 years ago
- A crack 💥 version of Ghostify, that helps you view Instagram stories without a trace (the story owner won't know you saw their story!)☆8Updated 2 years ago
- Offensive Security Vault structure for Obsidian☆19Updated 2 years ago
- In-depth Attack Surface Mapping and Asset Discovery☆12Updated 5 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆15Updated last year
- Some useful scripts for CobaltStrike☆10Updated 6 years ago