Contains all the required AWS Books, Code and materials for learning.
☆19May 7, 2024Updated last year
Alternatives and similar repositories for awsbit-1
Users that are interested in awsbit-1 are comparing it to the libraries listed below
Sorting:
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 2 years ago
- Demonstrating the possibility of stealing the private data of Harvard students and professors <3☆11Dec 13, 2015Updated 10 years ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆14Nov 2, 2022Updated 3 years ago
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Jun 20, 2022Updated 3 years ago
- ☆19Aug 14, 2024Updated last year
- This solution presents a traditional 3-tier architecture in AWS.☆15May 1, 2023Updated 2 years ago
- ☆18Jul 3, 2022Updated 3 years ago
- Application for saving your things! Modern and comfortable UI with a powerful markdown editor, also an easily configurable and self-hosta…☆13Apr 23, 2023Updated 2 years ago
- Collection of stuffs related to Information Security☆15Jul 26, 2020Updated 5 years ago
- A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell option…☆14Jun 27, 2023Updated 2 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆14Aug 17, 2022Updated 3 years ago
- A terminal plugin to make Kali Linux objectively better - compatible with ohmyzsh☆17Jan 23, 2024Updated 2 years ago
- Blogging seems easy with github actions 🤩☆16Feb 18, 2022Updated 4 years ago
- Systemback_source-1.9.4☆15Jan 2, 2021Updated 5 years ago
- ☆19Mar 12, 2024Updated last year
- dotfiles☆19Feb 18, 2025Updated last year
- A curated list of TryHackme (THM) and HackTheBox (HTB) resources, modules and rooms to be used with OSCP. The list is not complete and wi…☆35May 28, 2023Updated 2 years ago
- ☆18Apr 1, 2022Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Jun 20, 2022Updated 3 years ago
- ☆31May 1, 2023Updated 2 years ago
- ☆27Jul 3, 2023Updated 2 years ago
- Making your own CTF☆26Jan 5, 2021Updated 5 years ago
- Basic connection of flask and nginx via docker-compose☆28Aug 24, 2022Updated 3 years ago
- Proof-of-Concept for Server Side Request Forgery (SSRF) in request-baskets (<= v.1.2.1)☆30Aug 9, 2023Updated 2 years ago
- OS Disk Scheduling Algorithms implementations in C and JAVA☆20Feb 18, 2022Updated 4 years ago
- CTFs as you need them☆30May 3, 2023Updated 2 years ago
- Convert markdown to HTML and launch it in a browser.☆30Jan 19, 2026Updated last month
- Material from CTF machines I have attempted☆39Jul 5, 2021Updated 4 years ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆27May 23, 2023Updated 2 years ago
- This Repository Talks about the Follina MSDT from Defender Perspective☆38Jun 2, 2022Updated 3 years ago
- Apache Ofbiz CVE-2023-51467 图形化漏洞利用工具☆39Jan 6, 2024Updated 2 years ago
- CHANGE BACKGROUND LOGIN SCREEN (Kali Linux 2022, 2023.1, 2023.2, 2023.3)☆32Jul 30, 2024Updated last year
- ☆43Aug 28, 2023Updated 2 years ago
- Turn webhooks into websockets☆44Feb 11, 2026Updated 2 weeks ago
- ☆38Feb 5, 2025Updated last year
- Run & Deploy Spring Boot CRUD Application With MySQL on K8S☆45Aug 8, 2022Updated 3 years ago
- ☆49May 2, 2024Updated last year
- Script is a proof of concept how to control your machine by using social media sites.☆23Feb 14, 2018Updated 8 years ago