merces / bashacksLinks
A set of functions to increase productivity while hacking with Bash
☆206Updated 6 months ago
Alternatives and similar repositories for bashacks
Users that are interested in bashacks are comparing it to the libraries listed below
Sorting:
- Fast, simple and portable hexadecimal/ASCII dumper☆67Updated 3 years ago
- H2HC 2016 Slides/Materials/Presentations☆29Updated 9 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Updated 5 years ago
- A command line Swiss army knife for string and number conversions☆18Updated 5 years ago
- H2HC Magazine☆120Updated 9 months ago
- Livro: Engenharia Reversa - Fundamentos e Prática☆202Updated 2 months ago
- git clone all repositories and gists from a given GitHub username☆32Updated 2 months ago
- Kurgan AI - Web Application Security Analyzer☆26Updated 8 years ago
- This program focuses on automating the download, installation and compilation of pentest tools from source☆33Updated 7 years ago
- Repositório com exemplos do curso "Programação Moderna em C"☆100Updated 5 years ago
- Framework for rapid development of offensive security tools☆109Updated this week
- cuz life is scriptable...☆26Updated 9 years ago
- Ferramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de re…☆107Updated 7 years ago
- Ferramenta de Reconhecimento para Pentest☆48Updated 4 years ago
- Telegram bot, created to verify if your e-mail leaked☆27Updated 4 years ago
- SPLITTER is TOR based load balance approach create to difficult correlation, traffic analysis and statistical attacks inside TOR network.☆135Updated 2 years ago
- Man in the middle automated attacks☆21Updated 10 years ago
- H2HC 2017 Slides/Materials/Presentations☆48Updated 7 years ago
- An Open Source Malware Analysis Pipeline System☆157Updated 4 years ago
- laboratório sobre buffer overflows☆15Updated 8 years ago
- Vimana is an experimental security tool that aims to provide resources for auditing Python web applications.☆38Updated 4 years ago
- ☆33Updated 5 years ago
- ☆29Updated 9 months ago
- Pentest tool for OSINT in social networks☆36Updated 10 years ago
- articles of hacking, programming, privacy, activism☆22Updated 6 years ago
- ☆13Updated 5 years ago
- Lock user screen every time the flash drive is unplugged. Creating a two-step authentication on the machine☆16Updated 7 years ago
- [W.I.P] An ecosystem of crawlers for detecting: leaks, sensitive data exposure and attempts exfiltration of data☆32Updated this week
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Updated 11 months ago
- Please, see README.md for further information.☆12Updated 8 months ago