nirbhayvashisht / first-pr-repoView external linksLinks
A step by step guide to help people make their first Pull Request
☆29Jul 28, 2023Updated 2 years ago
Alternatives and similar repositories for first-pr-repo
Users that are interested in first-pr-repo are comparing it to the libraries listed below
Sorting:
- Simple Recon is just a simple bash script to automate my recon process.☆27May 12, 2021Updated 4 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- Simple smtp server in go☆11Jul 17, 2017Updated 8 years ago
- ☆11Dec 25, 2020Updated 5 years ago
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆11Dec 23, 2019Updated 6 years ago
- Collection of useful command line commands☆14Dec 10, 2021Updated 4 years ago
- Articles and labs relating to P2S Client VPN solutions on Microsoft Azure☆17Jun 9, 2023Updated 2 years ago
- A collection of my answers to the exercises in Modern Cryptography: Theory and Practice by Wenbo Mao☆10Oct 8, 2017Updated 8 years ago
- ☆12Sep 23, 2023Updated 2 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- This is both a terrible and wonderful idea.☆12Oct 2, 2019Updated 6 years ago
- Various documentation and write-ups for challenges and research☆12Sep 26, 2019Updated 6 years ago
- Scanner for public s3 buckets☆12Oct 23, 2017Updated 8 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 2 years ago
- Sample code material for BoF exploit training☆10May 12, 2020Updated 5 years ago
- ☆11Jun 19, 2024Updated last year
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- ☆11Oct 17, 2020Updated 5 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- -☆11Nov 21, 2020Updated 5 years ago
- ☆12Jun 20, 2020Updated 5 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 4 years ago
- LFI/RFI scanner by Iman Karim (fimap.dev@gmail.com)☆10Jul 3, 2015Updated 10 years ago
- CTF Writeups☆12Feb 25, 2023Updated 2 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- Just simple helper tool for generate github search link☆18Feb 28, 2021Updated 4 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- Identify vulnerabilities in your API's using the OpenAPI Security Scanner☆12Dec 6, 2018Updated 7 years ago
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago