jkaberg / byd-react-app-reverseView external linksLinks
☆24Dec 16, 2024Updated last year
Alternatives and similar repositories for byd-react-app-reverse
Users that are interested in byd-react-app-reverse are comparing it to the libraries listed below
Sorting:
- ☆56Updated this week
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 6 months ago
- Perfect Dark mode support for TanStack Start☆27Oct 26, 2025Updated 3 months ago
- RuCTF 2022. Developed with ♥ by Hackerdom team☆10May 22, 2022Updated 3 years ago
- C4T BuT S4D Attack-Defence CTF☆13Feb 6, 2022Updated 4 years ago
- ☆10Feb 15, 2023Updated 3 years ago
- Custom neovim configuration for software development.☆12Feb 4, 2026Updated last week
- Flag submission system for Attack/Defense CTFs☆13Jul 5, 2021Updated 4 years ago
- Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.☆24Jan 15, 2026Updated last month
- ☆31Aug 13, 2025Updated 6 months ago
- mcp-language-server gives MCP enabled clients access semantic tools like get definition, references, rename, and diagnostics.☆26Feb 1, 2026Updated 2 weeks ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 8 months ago
- ☆19Nov 28, 2024Updated last year
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- An Ansible role that runs Vulhub environments on a Linux system.☆20Oct 15, 2025Updated 4 months ago
- GPSProbe allows you to record GPS, MAC address, signal strength etc. of wifi enabled devices nearby.☆19Oct 19, 2024Updated last year
- ☆20Nov 5, 2025Updated 3 months ago
- Learn how to intercept flutter apps☆23Jan 19, 2024Updated 2 years ago
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆25May 6, 2025Updated 9 months ago
- Creating a Fake WhatsApp Message via SQLite: Understanding the Logic Behind the Manipulation☆36Jul 28, 2025Updated 6 months ago
- HITB SECCONF EDU CTF 2021. Developed with ❤️ by Hackerdom team and HITB.☆19Aug 28, 2021Updated 4 years ago
- My blog.☆23Nov 10, 2025Updated 3 months ago
- 5G Sequence Analyzer☆29Jan 12, 2023Updated 3 years ago
- Slides and videos from talks given at cons☆25Jun 19, 2025Updated 7 months ago
- Rubber Ducky powered by NeoKey☆29Jun 3, 2024Updated last year
- Crackmapexec custom scripts used in my internal pentests.☆25Nov 12, 2023Updated 2 years ago
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆27May 24, 2024Updated last year
- Shadcn Tanstack Form component set☆66Oct 13, 2025Updated 4 months ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆36Apr 24, 2025Updated 9 months ago
- ExploitFarm is an attacker and flag submitter for A/D CTF☆40Jan 27, 2026Updated 2 weeks ago
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆25May 7, 2025Updated 9 months ago
- ☆47Dec 5, 2025Updated 2 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- My personal nixos configuration☆25Jan 22, 2025Updated last year
- ☆35Sep 18, 2024Updated last year
- A process injection technique using only thread context manipulation☆41Dec 18, 2023Updated 2 years ago