☆27Jul 2, 2020Updated 5 years ago
Alternatives and similar repositories for workshops
Users that are interested in workshops are comparing it to the libraries listed below
Sorting:
- ☆13Mar 27, 2021Updated 4 years ago
- Security conferences talks☆25Jul 10, 2020Updated 5 years ago
- How long will it take to crack a hash ?☆31Mar 25, 2020Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 6 years ago
- My first iOS 'jailbreak' , using CVE 2016-4655 & CVE 2016-4656☆11Jun 16, 2019Updated 6 years ago
- Deploying of infrastructure and technologies for a SOC as a Service ( SOCasS)☆14Apr 10, 2020Updated 5 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆11Mar 1, 2022Updated 4 years ago
- ☆13Apr 8, 2021Updated 4 years ago
- Basics on commands/tools/info on how to assess the security of mobile applications☆1,652Dec 19, 2023Updated 2 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 7 months ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- commonspeak2 subdomains wordlist generated daily **DEPRECATED** The author(s) of commonspeak2 maintain an official repo with more lists. …☆40May 21, 2021Updated 4 years ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆40Dec 29, 2020Updated 5 years ago
- 4xxbypass☆66Mar 29, 2021Updated 4 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- ☆38Aug 19, 2021Updated 4 years ago
- Scala Framework for web applications using graph database☆23Jun 17, 2022Updated 3 years ago
- Labs from our workshop "Demystifying the server-side".☆17May 30, 2022Updated 3 years ago
- Parameter-Reflect-Finder is a python based tool that helps you find reflected parameters which can have potential XSS or Open redirection…☆16Aug 8, 2022Updated 3 years ago
- Code snippets I find useful☆32Sep 25, 2017Updated 8 years ago
- Python script to decrypt files encrypted using Cordova in Android app☆15Aug 19, 2018Updated 7 years ago
- Just an experiment with hash cracking :) few password lists along with some good password cracking rule sets.☆13Feb 29, 2020Updated 6 years ago
- Arduino and Raspberry PI Development Kit☆10Jun 28, 2017Updated 8 years ago
- ☆76Nov 30, 2020Updated 5 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆41Apr 10, 2023Updated 2 years ago
- A collection of utilities to simplify the creation of Burp Suite plugins☆22Dec 14, 2023Updated 2 years ago
- Take a list of IP addresses and probe for working HTTP and HTTPS servers☆12Mar 12, 2020Updated 6 years ago
- Retrieve the complete build history for every job ever created and executed on a given Jenkins instance.☆67Apr 25, 2025Updated 10 months ago
- Wheres My Git - Find /.git/config files based on dirs found in home url☆20Feb 14, 2022Updated 4 years ago
- Clientside vulnerability / reflected xss fuzzer☆149Jul 29, 2023Updated 2 years ago
- A simple Cherry Tree template that can be used to organize bug bounties☆40Aug 13, 2019Updated 6 years ago
- ☆54Feb 25, 2021Updated 5 years ago
- Arduino Kitabimizda Gecen Ornek Kodlar☆10Feb 23, 2017Updated 9 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Mastering Internet of Things by Packt☆11Jan 30, 2023Updated 3 years ago
- ☆20Mar 14, 2025Updated last year