jivoi / ossu
open source society university
☆21Updated 8 years ago
Alternatives and similar repositories for ossu:
Users that are interested in ossu are comparing it to the libraries listed below
- cool dockerfiles☆12Updated 8 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆13Updated 3 years ago
- openvpn server configs☆13Updated 8 years ago
- site source jivoi.github.io☆22Updated 2 years ago
- how-to monitor Docker hosts☆10Updated 8 years ago
- roadmap for being a self-taught hacker☆7Updated last year
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Updated 2 years ago
- web development with PHP and Docker.☆7Updated 8 years ago
- home! sweet home☆23Updated 5 years ago
- ☆20Updated 8 years ago
- buffer overflow examples☆22Updated 7 years ago
- A curated list of GPT agents for cybersecurity☆7Updated 5 months ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆13Updated 2 years ago
- Script hack Facebook mbf v2☆10Updated 4 years ago
- intrusion detection☆23Updated 7 years ago
- Personal blog about cyber security and challenges☆17Updated 11 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 9 months ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- Crack your non-rooted android device pin code with 100% guarantee aslong as usb debugging has been enable. Wbruter also has support for p…☆13Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated 3 years ago
- gitbook of all pentesting knowledge☆20Updated last year
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆11Updated 3 years ago
- Digital Forensics and Incident Response (DFIR) Workshop☆10Updated 7 years ago
- Yet another powerful payload encoder/decoder☆14Updated 2 years ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆27Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆11Updated 2 years ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆60Updated 3 years ago
- hacking tools awesome lists☆14Updated 7 years ago
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆13Updated 4 years ago