mzfr / notesLinks
A miscellany of thoughts.
☆47Updated last year
Alternatives and similar repositories for notes
Users that are interested in notes are comparing it to the libraries listed below
Sorting:
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
- ☆49Updated 5 years ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆66Updated 4 years ago
- ☆23Updated 4 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Updated 3 years ago
- Writeups for CTF challenges.☆78Updated 2 years ago
- Bug bounty bot for channel☆16Updated 3 years ago
- Lucideus CyberGym is the internal CTF event we organise for our security professionals to grow and learn together. Now everyone can acces…☆86Updated 4 years ago
- Identifies vulnerabilities in network_security_config.xml, AndroidManifest.xml and if Firebase URL are accessible publicly☆52Updated 2 years ago
- Writeups for all the HTB machines I have done☆64Updated 2 years ago
- Source for Pentester Land☆39Updated 3 years ago
- In this repository I'll host my research and methodologies for auditing vulnerabilities☆29Updated 6 years ago
- A table containing CTF challenge links and their corresponding walkthroughs from different platforms.☆11Updated 3 years ago
- Target practice for ffuf☆69Updated 4 years ago
- Workflow for pentesting web applications.☆21Updated 6 years ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆61Updated 2 years ago
- Penetration Testing Checklist☆37Updated 5 years ago
- Notes from OSCP, CTF, security adventures, etc...☆64Updated last year
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Updated 3 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14Updated 4 years ago
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆40Updated 2 years ago
- Curated lists of InfoSec on Twitter. Find out who's awesome to follow!☆91Updated 4 years ago
- One liner regex match to search inside JS files, using curl and grep!☆29Updated 4 years ago
- A list of universities with vulnerability disclosure policies☆52Updated 4 years ago
- security.txt collection of most popular world-wide domains☆54Updated 2 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15Updated 7 months ago
- An example of a vulnerability in the early JWT token node.js library☆37Updated 2 years ago
- someone needs help☆66Updated 3 years ago
- Guide to SSRF☆73Updated 2 years ago
- ☆13Updated 3 years ago