lethanhtung01011980 / NotesLinks
☆11Updated 4 years ago
Alternatives and similar repositories for Notes
Users that are interested in Notes are comparing it to the libraries listed below
Sorting:
- ☆33Updated 4 months ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆14Updated 7 years ago
- Burp Suite Pro extension☆10Updated 8 years ago
- ☆22Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆36Updated 5 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 7 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 3 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Clickjacking PoC Generator☆35Updated 4 years ago
- ☆15Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Updated 7 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆16Updated 5 years ago
- SNMP enumeration script☆13Updated 5 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- Subdomain Enumeration and Scanner☆33Updated 4 years ago
- Custom scripts used during the scenario☆21Updated 4 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago