Learn how to submit your first PR.
☆20Apr 12, 2024Updated 2 years ago
Alternatives and similar repositories for Road-to-OSS
Users that are interested in Road-to-OSS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- https://english.ncsc.nl/contact/reporting-a-vulnerability-cvd☆21Feb 17, 2022Updated 4 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated last year
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- ☆10Aug 9, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 5 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 3 years ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 3 years ago
- ☆12Apr 20, 2025Updated 11 months ago
- ☆13Oct 24, 2024Updated last year
- ☆13Dec 12, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- Discord Bot for Realtime Updates from CTFd☆10Jan 10, 2021Updated 5 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- ☆10Dec 8, 2022Updated 3 years ago
- Kudzu is a Go C2 platform with an emphasis on extensibility.☆11Mar 30, 2021Updated 5 years ago
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- A tool to check for response status codes with ease☆13Apr 29, 2023Updated 2 years ago
- Custom mini tools during Red Teaming engagements☆24Mar 7, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- ☆14Dec 24, 2024Updated last year
- ☆10Oct 25, 2020Updated 5 years ago
- ☆14Mar 8, 2023Updated 3 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injectio…☆20Jul 28, 2025Updated 8 months ago
- bruteforce the admin panel☆15Jun 6, 2018Updated 7 years ago
- A simple tool to inject shellcode into the remote process with the ability to spoof parent process.☆16Mar 18, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆12Feb 20, 2022Updated 4 years ago
- Tools and scripts to deploy and manage OpenRelik instances☆16Mar 23, 2026Updated 3 weeks ago
- ☆13May 18, 2022Updated 3 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 11 months ago
- Vault of Windows Registry forensic artifacts☆30Nov 12, 2025Updated 5 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- Open-source, enterprise-grade threat modeling platform☆50Apr 11, 2026Updated last week