naemazam / terminal-portfolioLinks
An ordinary website can make and use by everyone. so What is The difference between a Geek and common people?
☆18Updated 4 years ago
Alternatives and similar repositories for terminal-portfolio
Users that are interested in terminal-portfolio are comparing it to the libraries listed below
Sorting:
- Offensive Security Python. Collection of python scripts that I created/pirated/curated to help me understand CyberSecurity. I find it hel…☆52Updated 4 months ago
- Play Hack The Box directly on your system.☆51Updated 3 months ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Updated 2 years ago
- Offensive Security Vault structure for Obsidian☆23Updated 2 years ago
- Magicspoofing it's a python script that checks & test SPF/DMARC DNS records an tries to spoof a domain with a open relay mail system.☆54Updated 8 months ago
- capNcook - a dark web exploration tool☆118Updated last year
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆60Updated last year
- PrivacyNet: Privacy Network☆52Updated last year
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆114Updated 6 months ago
- Writeups on my TryHackMe adventures!☆58Updated 2 years ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your car…☆33Updated last month
- ☆46Updated last year
- ☆66Updated 2 years ago
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago
- HydrAttack PoC eMail Spoofer Module is designed to test the security posture of a domain against email spoofing attacks. It performs step…☆27Updated 4 months ago
- Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull reques…☆60Updated last year
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆154Updated last year
- This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the …☆18Updated last year
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆84Updated 9 months ago
- These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation☆18Updated 4 years ago
- ☆20Updated last year
- What the name says....☆103Updated last year
- a collection of best pentest resources☆29Updated 6 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆51Updated 3 years ago
- Making your own CTF☆26Updated 4 years ago
- OSINT web scraper for SatNow to extract details about satellite components and subsystem specs for in-depth reconnaissance 🛸☆64Updated last year
- Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delive…☆44Updated 7 months ago
- Obsidian Markdown Cybersecurity Notes☆28Updated last year
- Bypassing File Upload Restriction using Magic Bytes☆22Updated 3 years ago
- Pull Hashes Decryption From Online Sources Using Python☆17Updated last year