Single Repository to keep policy and simmilar documentation
☆35Feb 16, 2025Updated last year
Alternatives and similar repositories for Documentation
Users that are interested in Documentation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 4 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 5 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆13Sep 1, 2017Updated 8 years ago
- ☆36Jan 22, 2025Updated last year
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- This is a proof-of-work for abusing "fsmonitor" against IDE.☆43Nov 22, 2025Updated 4 months ago
- XSS scanning with Dalfox on Github-action☆26Nov 26, 2023Updated 2 years ago
- socat version 2☆10Aug 30, 2012Updated 13 years ago
- Archive of Metasploit CTF challenges.☆14Jan 21, 2022Updated 4 years ago
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Vim plugin for Phabricator and Arcanist☆19Nov 6, 2021Updated 4 years ago
- ☆11Jun 19, 2024Updated last year
- A general Javascript keylogger to be used in an XSS PoC☆19Feb 23, 2020Updated 6 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Apr 25, 2018Updated 7 years ago
- Browse and search through nmap's NSE scripts.☆59Jun 8, 2017Updated 8 years ago
- ☆14Sep 16, 2021Updated 4 years ago
- ☆11Jan 29, 2022Updated 4 years ago
- Ember.js mobile app that demos basic animated transitions and touch gestures.☆76Jul 31, 2013Updated 12 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Personal news feed: search for results on Reddit/Pinboard/Twitter/Hackernews and read as RSS☆34Mar 29, 2026Updated 2 weeks ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated this week
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- A ~$20.00 tool for logging data/testing devices with a Wiegand Interface. Can be used to create a portable RFID reader or installed direc…☆10Mar 25, 2018Updated 8 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- Understanding CoAP with Packet Captures.☆15Jun 27, 2023Updated 2 years ago
- a tiny tool for swf hacking, just browse it:)☆13Mar 12, 2013Updated 13 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- FirePrint is a security tool for finding misconfigured Firebase realtime databases in Android or iOS applications.☆22Apr 4, 2024Updated 2 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆329Mar 27, 2024Updated 2 years ago
- Customizable Security Scanner written in Go☆16Jul 6, 2016Updated 9 years ago
- Updated crt.sh one liner to get subdomains☆18Jan 13, 2020Updated 6 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- A Colab For Bug Hunting!☆205Jun 28, 2021Updated 4 years ago
- The OBC Software to be ran on-board the AcubeSAT nanosatellite☆16Nov 9, 2025Updated 5 months ago