My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.
☆15Jul 5, 2023Updated 2 years ago
Alternatives and similar repositories for hunter_diary
Users that are interested in hunter_diary are comparing it to the libraries listed below
Sorting:
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- ☆12Jun 20, 2020Updated 5 years ago
- ☆17Dec 18, 2025Updated 2 months ago
- PowerShell tool to triage systems☆12May 17, 2023Updated 2 years ago
- A password manager with physical 2FA.☆15Sep 5, 2021Updated 4 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Apr 1, 2023Updated 2 years ago
- LOL's collections☆24Oct 4, 2020Updated 5 years ago
- Everything you see on my tutorials is here in this repo☆10Jun 19, 2017Updated 8 years ago
- ☆10Jul 21, 2021Updated 4 years ago
- code written on artificial intelligence lab at school☆10Oct 4, 2021Updated 4 years ago
- A curated list of different pentesting resources☆30Feb 26, 2022Updated 4 years ago
- ☆33Oct 12, 2022Updated 3 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Updated this week
- ☆10Jun 13, 2024Updated last year
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- ☆44Jul 11, 2025Updated 7 months ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- How to Get Started into Bug Bounty Complete Beginner Guide ( Part 1 Web Pentesting ) Hello guys, after a lot of requests and questions o…☆11May 30, 2021Updated 4 years ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 7 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Simons Observatory specific OCS agents.☆15Feb 23, 2026Updated last week
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- ☆10May 1, 2020Updated 5 years ago
- ☆15Sep 4, 2020Updated 5 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- my templates for the nuclei engine to find security vulnerabilities.☆10Aug 19, 2024Updated last year
- ☆13Jan 6, 2022Updated 4 years ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- Just an automation script to delete/unsend fb messages. Inspired from: @pishangujeniya/instagram-helper☆10Jul 31, 2022Updated 3 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago