☆48Jan 1, 2018Updated 8 years ago
Alternatives and similar repositories for yeyintminthuhtut-Awesome-Red-Teaming
Users that are interested in yeyintminthuhtut-Awesome-Red-Teaming are comparing it to the libraries listed below
Sorting:
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆17Jan 15, 2022Updated 4 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32May 10, 2018Updated 7 years ago
- ☆10May 15, 2020Updated 5 years ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- A collection of awesome penetration testing resources☆13Jan 13, 2019Updated 7 years ago
- Capturing audio (.wav) from target using a link☆12Feb 21, 2020Updated 6 years ago
- ☆16Jul 25, 2018Updated 7 years ago
- ☆13Jan 25, 2020Updated 6 years ago
- ☆210Oct 23, 2022Updated 3 years ago
- VK bot для сноса бесед☆11Feb 7, 2021Updated 5 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆951Feb 26, 2021Updated 5 years ago
- Каталог нетсталкерских ресурсов, команд, инструментов, источников контента.☆11Nov 16, 2020Updated 5 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆83Nov 7, 2020Updated 5 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- ☆10Aug 21, 2024Updated last year
- Quick OSINT checks for IPs and Domains during triage and investigations.☆31Jun 26, 2024Updated last year
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15May 25, 2022Updated 3 years ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Nov 1, 2024Updated last year
- Charter of the Open Network Infrastructure Association☆13Sep 9, 2017Updated 8 years ago
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 3 months ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- ☆17Jul 18, 2020Updated 5 years ago
- OSCP Privilege Escalation MindMap/Guide☆198Apr 4, 2022Updated 3 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- https://github.com/qazbnm456/awesome-web-security☆17Oct 10, 2020Updated 5 years ago
- Kernel module that allows hiding files in any filesystem☆23Dec 20, 2024Updated last year
- Program to detect and remove the root level SSL certificates installed by NCALayer program☆14Jul 19, 2019Updated 6 years ago
- ☆102Nov 3, 2019Updated 6 years ago
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆20Apr 12, 2020Updated 5 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- Java Basic Codes for Beginner to Advance, Here you will get Java Programming codes with examples by GitCodeSwetabh☆10Oct 2, 2020Updated 5 years ago
- A python command line reverse geocoding location request and response tool based on the coordinates of cell phone towers pinged by a user…☆23Oct 29, 2020Updated 5 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Feb 1, 2020Updated 6 years ago
- ☆484Aug 12, 2022Updated 3 years ago
- Java network leaks detection utility with easy configurable algorithms☆20Mar 21, 2017Updated 8 years ago
- I'm uploading dorks here.☆53Nov 7, 2015Updated 10 years ago