A miscellany of thoughts.
☆49Mar 31, 2024Updated 2 years ago
Alternatives and similar repositories for notes
Users that are interested in notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A table containing CTF challenge links and their corresponding walkthroughs from different platforms.☆12Oct 23, 2022Updated 3 years ago
- commands☆27Nov 5, 2020Updated 5 years ago
- ☆12Dec 26, 2021Updated 4 years ago
- A tool for testing subdomain takeover possibilities at a mass scale.☆50May 23, 2021Updated 4 years ago
- This is a comprehensive Subdomain Enumeration Guide that traces back to my GitBook.☆32Mar 19, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Docker container to use blutter (dart decompiler for android apps)☆21Sep 18, 2024Updated last year
- Dalvik emulator written in Kotlin, highly inspired by Katalina☆13Nov 11, 2024Updated last year
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆57Jul 12, 2022Updated 3 years ago
- This repository contains links to all the 100 days tweets that I posted during the #100DaysOfHacking challenge.☆17Apr 11, 2022Updated 4 years ago
- A Python-based automation tool for interacting with the Burp Suite API to run scans and retrieve vulnerability data programmatically.☆10Oct 3, 2022Updated 3 years ago
- A curated list of daily learnings, writeups, blogs, tips and everything related to hacking☆12Feb 5, 2023Updated 3 years ago
- ☆10May 6, 2021Updated 4 years ago
- Authorization-Nuclei-Templates☆39Sep 16, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Load your data into burp☆11Apr 26, 2023Updated 3 years ago
- ☆11May 28, 2022Updated 3 years ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆43Jan 31, 2026Updated 3 months ago
- ☆43Jun 18, 2025Updated 10 months ago
- Script to read input from stdin and encode it☆19Aug 23, 2023Updated 2 years ago
- ☆35Aug 2, 2022Updated 3 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆18May 29, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆12Dec 3, 2022Updated 3 years ago
- Bug bounty domain manager with validation, exports & Redis storage ✨☆30Jun 5, 2025Updated 10 months ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- Recon tool for pen-tester's☆21Sep 9, 2021Updated 4 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Sep 6, 2021Updated 4 years ago
- Advanced Reconnaissance and Web Application Discovery☆90Dec 22, 2021Updated 4 years ago
- It's collection of my learning during 100 days .☆35Jan 31, 2022Updated 4 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- 0x0p1n3r is set of combination of other tools and one line scripts to find subdomains easily and to check subdomain takeover☆57Dec 15, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Query various sources for CVE proof-of-concepts☆53Jun 1, 2023Updated 2 years ago
- ☆26Nov 15, 2024Updated last year
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆11Aug 26, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- Scripts/tools to destroy things☆16Sep 13, 2021Updated 4 years ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆62Apr 23, 2026Updated last week
- Tiny and fast port scanner (Sliver edition)☆30Feb 17, 2026Updated 2 months ago