A miscellany of thoughts.
☆49Mar 31, 2024Updated last year
Alternatives and similar repositories for notes
Users that are interested in notes are comparing it to the libraries listed below
Sorting:
- A table containing CTF challenge links and their corresponding walkthroughs from different platforms.☆11Oct 23, 2022Updated 3 years ago
- commands☆27Nov 5, 2020Updated 5 years ago
- ☆12Dec 26, 2021Updated 4 years ago
- A tool for testing subdomain takeover possibilities at a mass scale.☆50May 23, 2021Updated 4 years ago
- This is a comprehensive Subdomain Enumeration Guide that traces back to my GitBook.☆31Mar 19, 2025Updated last year
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Jun 7, 2022Updated 3 years ago
- Dalvik emulator written in Kotlin, highly inspired by Katalina☆13Nov 11, 2024Updated last year
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆54Jul 12, 2022Updated 3 years ago
- This repository contains links to all the 100 days tweets that I posted during the #100DaysOfHacking challenge.☆17Apr 11, 2022Updated 3 years ago
- A curated list of daily learnings, writeups, blogs, tips and everything related to hacking☆12Feb 5, 2023Updated 3 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- ☆10May 6, 2021Updated 4 years ago
- Authorization-Nuclei-Templates☆39Sep 16, 2024Updated last year
- Load your data into burp☆11Apr 26, 2023Updated 2 years ago
- ☆11May 28, 2022Updated 3 years ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆42Jan 31, 2026Updated last month
- ☆43Jun 18, 2025Updated 9 months ago
- ☆35Aug 2, 2022Updated 3 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- ☆12Dec 3, 2022Updated 3 years ago
- Bug bounty domain manager with validation, exports & Redis storage ✨☆29Jun 5, 2025Updated 9 months ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- Recon tool for pen-tester's☆21Sep 9, 2021Updated 4 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Sep 6, 2021Updated 4 years ago
- Advanced Reconnaissance and Web Application Discovery☆90Dec 22, 2021Updated 4 years ago
- It's collection of my learning during 100 days .☆35Jan 31, 2022Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Jul 28, 2023Updated 2 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- 0x0p1n3r is set of combination of other tools and one line scripts to find subdomains easily and to check subdomain takeover☆57Dec 15, 2020Updated 5 years ago
- Query various sources for CVE proof-of-concepts☆53Jun 1, 2023Updated 2 years ago
- ☆26Nov 15, 2024Updated last year
- A tool to migrate Burpsuite HTTP history to Caido☆35Apr 25, 2025Updated 10 months ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Aug 26, 2024Updated last year
- A tiny set of helper scripts for ipinfo☆17Aug 7, 2020Updated 5 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- Scripts/tools to destroy things☆17Sep 13, 2021Updated 4 years ago
- A collection of custom built scripts to exploit known vulnerability chains☆25Jul 23, 2021Updated 4 years ago