lrusso96 / CryptographyLinks
Utils for Cryptography class (1047622)
☆13Updated 2 years ago
Alternatives and similar repositories for Cryptography
Users that are interested in Cryptography are comparing it to the libraries listed below
Sorting:
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆43Updated 4 years ago
- Ethical hacking, CTF, tools & etc☆22Updated 4 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 6 months ago
- Scan Google Maps Api Keys and see which services you can use. Original codebase from ozguralp/gmapsapiscanner☆24Updated 3 years ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆26Updated 2 years ago
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆61Updated 2 years ago
- OMLASP (Ideas Locas)☆21Updated 2 years ago
- Upload files done during my research.☆164Updated 4 months ago
- Repository of CVE found by OCD people☆77Updated last month
- 2022 CTF public release☆23Updated 3 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆56Updated 5 years ago
- Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued☆68Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆68Updated 3 years ago
- REST API backend for Reconmap☆47Updated last week
- ☆56Updated 2 years ago
- This extension tells if visited sites have vulnerability disclosure programs☆42Updated last year
- A selection of rebuilt and from scratch exploits, scripts and ideas that can be used in red-teaming scenarios.☆6Updated last year
- My pen testing notes☆52Updated 2 years ago
- Wireless Pentest☆18Updated 7 years ago
- Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once☆50Updated 3 years ago
- Extract Useful info from SSL VPN Directory Traversal Vulnerability (FG-IR-18-384)☆78Updated last year
- Static analysis of wordpress plugins☆62Updated 4 years ago
- ☆19Updated 4 years ago
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆95Updated last year
- Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability☆81Updated 2 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- ☆74Updated last year
- CLI tool for filtering URLs/IPs with automatically-updated Bug Bounty program scope rules.☆33Updated 2 months ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆67Updated 4 years ago