jivoi / ossuLinks
open source society university
☆31Updated 9 years ago
Alternatives and similar repositories for ossu
Users that are interested in ossu are comparing it to the libraries listed below
Sorting:
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆17Updated 4 years ago
- openvpn server configs☆14Updated 9 years ago
- Socks5 proxy server by golang☆11Updated 6 years ago
- gitbook of all pentesting knowledge☆21Updated 2 years ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆62Updated 2 months ago
- GitHub Is the HOME ! 🔱 We believe in God, everyone else is suspicious 🔱☆28Updated last week
- site source jivoi.github.io☆22Updated 3 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆16Updated 2 years ago
- Personal blog about cyber security and challenges☆18Updated last year
- ☆22Updated 9 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago
- curated list of open-source anti-censorship tools☆19Updated 3 years ago
- home! sweet home☆25Updated 6 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Updated 2 years ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆30Updated 2 years ago
- Hax is a mini-tool with really useful hacking tools.☆20Updated 2 years ago
- Who We Are☆21Updated last year
- ☆22Updated 2 years ago
- Proof of concept denial of service over TOR stress test tool☆42Updated 7 years ago
- Fast Tool To Find Admin Panel Of Any Website☆20Updated last year
- A host-based IDS and network monitoring system (My graduation project)☆25Updated 4 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Updated 3 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 4 years ago
- ☆10Updated 3 years ago
- 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆13Updated 2 years ago
- A web front-end for password cracking and analytics☆16Updated 7 years ago
- A Network Automation framework focused on Cyber-Security☆46Updated 2 years ago
- List of sources for cybersecurity news☆41Updated 3 years ago
- For beginners which zero knowledge on ethical hacking!☆69Updated 5 years ago
- Hacking-Beginner-to-Expert-Guide-by-James-Patterson☆18Updated 4 years ago