☆38Mar 1, 2025Updated last year
Alternatives and similar repositories for Cheat-sheets
Users that are interested in Cheat-sheets are comparing it to the libraries listed below
Sorting:
- Some writeups for some CTFs☆18Apr 14, 2024Updated last year
- Tous les trucs utilisés dans les Tutos, les shellcodes, les templates, les notes...☆14Jan 15, 2024Updated 2 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- Get Started With ESP32 Over-the-Air (OTA) Updates.☆16Mar 22, 2024Updated last year
- A PHP wrapper template to execute PowerShell payloads☆11Apr 2, 2021Updated 4 years ago
- Obtenir un observateur☆12Dec 14, 2025Updated 3 months ago
- Automated Pentest Recon Scanner☆14Oct 6, 2017Updated 8 years ago
- ☆12Feb 3, 2017Updated 9 years ago
- ☆12Mar 10, 2020Updated 6 years ago
- A simple compiling of notes and information / teachings on how stegonography works, and how we can use stegonography to execute system co…☆11Feb 27, 2022Updated 4 years ago
- Analysis of ActBlue's 2019 mid-year FEC report☆13Dec 8, 2022Updated 3 years ago
- API, admin app and backend for EnviroMonitor project☆11Dec 8, 2017Updated 8 years ago
- Recon Automation☆11Sep 14, 2024Updated last year
- A multifunctional Android RAT with GUI based Web Panel without port forwarding.☆11Dec 18, 2022Updated 3 years ago
- Red Team Stuffs☆19Jul 7, 2022Updated 3 years ago
- Beautifully display social media and contact info on your website with these simple widgets.☆15Dec 6, 2022Updated 3 years ago
- CLI tool to quickly generate init.json to seed Echidna straight from your Foundry project.☆14Feb 20, 2023Updated 3 years ago
- Some random exploits that may or may not be useful. Not responsible for misuse.☆21Dec 12, 2018Updated 7 years ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 2 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- Ground Control Point interface (GCPi) for OpenDroneMap☆21Aug 17, 2020Updated 5 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆23Dec 19, 2022Updated 3 years ago
- VI-SVC model is just VITS without MAS and DurationPredictor.☆10Nov 9, 2023Updated 2 years ago
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- ☆20Sep 15, 2023Updated 2 years ago
- A self-documenting, progressive discovery API protocol ideal for AI agents.☆20Feb 18, 2026Updated last month
- This is my final 42's project Libasm, a small library in assembly☆16Jan 13, 2021Updated 5 years ago
- Slides from various conference talks☆37May 30, 2023Updated 2 years ago
- image puzzler maker and solver using Python and OpenCV☆13Feb 24, 2019Updated 7 years ago
- 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆13Aug 26, 2023Updated 2 years ago
- ☆15Sep 13, 2025Updated 6 months ago
- Simple script to install STALKER: Shadow of Chernobyl via Wine-Appimage (no wine required)☆10Nov 10, 2023Updated 2 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆13Feb 19, 2022Updated 4 years ago
- ☆13Dec 12, 2022Updated 3 years ago
- Examples for the IMUNES network emulator☆31Mar 6, 2026Updated 2 weeks ago
- A Sage implementation of the ROCA attack☆28May 16, 2023Updated 2 years ago
- Challenges and write-ups for GCC-CTF 2024☆19Mar 3, 2024Updated 2 years ago
- Exploiting Software-Defined Radio - Common attacks and a device to exploit them (Proof of Concept).☆17Jan 12, 2021Updated 5 years ago