scs-labrat / all-the-thingsView external linksLinks
☆14Dec 24, 2024Updated last year
Alternatives and similar repositories for all-the-things
Users that are interested in all-the-things are comparing it to the libraries listed below
Sorting:
- Tools and scripts to deploy and manage OpenRelik instances☆16Jun 11, 2025Updated 8 months ago
- SAP Message Server research presented at OPCDE 2019☆35Aug 18, 2020Updated 5 years ago
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- Simple Python script that will set up a PHP server for stealing cookies - and provided the payload needed.☆39Jan 28, 2025Updated last year
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- Pentesting toolbox for CachyOS/Cachy Handheld edition☆32Jan 29, 2026Updated 2 weeks ago
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- A simple scheduler (non preemptive) for the Arduino, written in C.☆11Mar 28, 2016Updated 9 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Hunt Smarter, Hunt Harder☆135Jan 12, 2026Updated last month
- ☆13Dec 12, 2022Updated 3 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injectio…☆16Jul 28, 2025Updated 6 months ago
- ☆12Apr 20, 2025Updated 9 months ago
- A Lua helper library for creating network protocol dissectors☆13Nov 26, 2020Updated 5 years ago
- Service-like OpenSignals architecture barebone for Rapid Application Development☆10Aug 14, 2023Updated 2 years ago
- ☆10Aug 9, 2024Updated last year
- Discord Bot for Realtime Updates from CTFd☆10Jan 10, 2021Updated 5 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- See https://www.meriac.com/dl/HID-iCLASS-security.pdf and https://events.ccc.de/congress/2010/Fahrplan/attachments/1784_HID-iClass-27C3.p…☆14Nov 26, 2017Updated 8 years ago
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- Ansible playbook for configuring Kali Linux to personal preferences☆10Oct 5, 2022Updated 3 years ago
- A small WinRM client designed for interacting with JEA endpoints.☆13Aug 29, 2024Updated last year
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- Small script to use PIR sensor for motion estimation on motionEye☆12May 29, 2020Updated 5 years ago
- ☆19Jul 23, 2025Updated 6 months ago
- Stream your CSV files to an HTTP API☆12Apr 9, 2018Updated 7 years ago
- Zigbee receiver for SDR devices with GNU Radio☆12Mar 26, 2021Updated 4 years ago
- ☆13May 18, 2022Updated 3 years ago
- A tool to check for response status codes with ease☆13Apr 29, 2023Updated 2 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- MailHunter is a tool to give you access to the exchange server mails.☆12Apr 16, 2021Updated 4 years ago
- Advanced test for proxy & waf☆13Sep 13, 2025Updated 5 months ago
- Phone Radar is a simple tool that allows you to scan mobile phone numbers and display the provider tied to the number, can be usefull to …☆14Dec 13, 2024Updated last year