This repository is about Learn | Hack | Share | Repeat.
☆11Dec 26, 2022Updated 3 years ago
Alternatives and similar repositories for Gyanam
Users that are interested in Gyanam are comparing it to the libraries listed below
Sorting:
- ☆10Jan 30, 2022Updated 4 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- TryhackMerooms☆20Mar 22, 2023Updated 2 years ago
- ☆49Mar 25, 2022Updated 3 years ago
- Ultimate Package Of 50 Bug Bounty Hunting Tools☆47Oct 3, 2025Updated 5 months ago
- Collection of my slide decks, conference videos and research white papers☆27Sep 23, 2025Updated 5 months ago
- ☆27Jul 30, 2021Updated 4 years ago
- ☆23Jun 30, 2021Updated 4 years ago
- ☆25Dec 4, 2019Updated 6 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- A testing Red Team Infrastructure created with Docker☆32Apr 5, 2022Updated 3 years ago
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆30Sep 16, 2021Updated 4 years ago
- OSCP☆37Nov 24, 2021Updated 4 years ago
- ☆10Jul 21, 2021Updated 4 years ago
- Cyber Security Foundations☆35May 30, 2021Updated 4 years ago
- A simple tool which makes creating nuclei templates even easier.☆37Jun 23, 2024Updated last year
- ☆133Dec 25, 2021Updated 4 years ago
- ☆34Jun 23, 2021Updated 4 years ago
- Stuff for bug bounty☆35Feb 1, 2023Updated 3 years ago
- ☆88May 27, 2021Updated 4 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Feb 27, 2026Updated last week
- ☆13Feb 26, 2021Updated 5 years ago
- ☆10Jun 13, 2024Updated last year
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ☆109Apr 4, 2025Updated 11 months ago
- Repository of open source malware here on Github!☆44Jan 11, 2022Updated 4 years ago
- ☆101Oct 18, 2023Updated 2 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- Browser History Histogram -- module for the Autopsy Forensic Browser☆11Sep 15, 2019Updated 6 years ago
- Just an automation script to delete/unsend fb messages. Inspired from: @pishangujeniya/instagram-helper☆10Jul 31, 2022Updated 3 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago