A collection of common web programming security mistakes.
☆16Jun 11, 2019Updated 6 years ago
Alternatives and similar repositories for hack-this
Users that are interested in hack-this are comparing it to the libraries listed below
Sorting:
- This api maked for "https://koinim.com/". This company haven't an api. But if you want use koinim api, use this script. It works splinter…☆10Nov 23, 2014Updated 11 years ago
- btcturk.com api client☆17Mar 26, 2019Updated 6 years ago
- Tutorial de Tidal e Hydra via OSC☆13Dec 8, 2019Updated 6 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Apr 19, 2017Updated 8 years ago
- Scapy ile ilgili bir takım alıştırmalar ve bilgiler içerir☆29May 2, 2016Updated 9 years ago
- A music player that lists and plays all .mp3 files in a given folder. Everything is written without any external code, except decoding of…☆11Feb 12, 2022Updated 4 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- This repository contains the support material for the introduction to DevOps course☆15May 30, 2019Updated 6 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- A Django-based Foreign Exchange data toolkit. Part of the Valuehorizon application ecosystem.☆10Jul 6, 2022Updated 3 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- Scoring Engine for CTF competitions☆48Feb 15, 2023Updated 3 years ago
- ☆14Aug 10, 2025Updated 6 months ago
- Marlin Simulator UI☆15Feb 19, 2026Updated last week
- Dotfiles☆10May 4, 2023Updated 2 years ago
- A course dedicated to focus on creative coding for art and design oriented projects☆12Nov 29, 2021Updated 4 years ago
- 蜜罐捕获的数据☆11May 16, 2016Updated 9 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- Example set from Rosetta Code for P5 (Processing)☆10Oct 31, 2020Updated 5 years ago
- For loop macros for Nim☆10Nov 28, 2020Updated 5 years ago
- 一款基于subDomainsBrute子域名爆破工具结果的处理脚本☆10Jul 28, 2017Updated 8 years ago
- 基于http代理的web漏洞扫描器的实现☆10Jul 5, 2015Updated 10 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- Collection of all of my processing code☆10May 20, 2022Updated 3 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- [kept for historical reasons, see efene] a calculator implemented in erlang that will turn into a toy language if I have time☆16Oct 24, 2009Updated 16 years ago
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 7 years ago
- Projection mapping examples in Processing☆20Jul 13, 2012Updated 13 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- Commodore 64 flame effect demo☆10Mar 31, 2019Updated 6 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- SIP-Based DDoS Defense Tool☆15Sep 6, 2018Updated 7 years ago