Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of the opps
☆13Feb 19, 2022Updated 4 years ago
Alternatives and similar repositories for FatFree-Incendiary-Pentest-Gems
Users that are interested in FatFree-Incendiary-Pentest-Gems are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- gitbook of all pentesting knowledge☆21May 1, 2023Updated 2 years ago
- Attempt to grind out the 100 offsec project challenges, conceptualized by github user, @kurogai, at his repo [https://github.com/kurogai/…☆16Jul 16, 2024Updated last year
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've …☆62Jun 20, 2025Updated 9 months ago
- ☆12Apr 17, 2022Updated 3 years ago
- A way to control devices via Bluetooth w/ an ESP32☆14Jul 6, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- 📨 Quick tool to finds and extract email addresses from a body of text☆12Apr 15, 2023Updated 2 years ago
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆13Jan 18, 2025Updated last year
- Erebus is a payload generator written in Nim.☆17Jun 13, 2023Updated 2 years ago
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- A proof of concept of a PHP Miner that can mine DuinoCoin☆10Apr 4, 2022Updated 3 years ago
- Transform your batch (bat) script into one binary.exe☆53Feb 11, 2024Updated 2 years ago
- header-fuzz allows you to fuzz any HTTP header with a wordlist and evaluate success or failure based on the returning HTTP status code.☆16Apr 15, 2020Updated 5 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- Bitcoin miner by Raphael Frajuca(Badguy5552)☆11Oct 10, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A custom PCB to replace the original SLI ribbon for the 3DFX Voodoo 2 PCI graphics cards.☆10May 10, 2025Updated 10 months ago
- A script to automatically generate TWRP-compatible device tree from a boot/recovery image☆11Apr 10, 2021Updated 4 years ago
- Hack.co.za old website mirror☆12Oct 30, 2017Updated 8 years ago
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- Auto Frida is a powerful, all-in-one automation toolkit that handles everything from Frida installation to script injection. Zero manual …☆68Mar 3, 2026Updated 3 weeks ago
- A script to generate multiple Privacy credit cards.☆11May 8, 2018Updated 7 years ago
- List of XSS Payloads☆15Jul 5, 2022Updated 3 years ago
- HTTPFuzzer is a simple python script to perform multiple fuzzing techniques for HTTP protocol☆13Aug 24, 2018Updated 7 years ago
- Invoke AI nodes for XYGrid and supporting nodes☆16Jan 2, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- bitcoincandy-miner-release☆15Sep 27, 2018Updated 7 years ago
- A simple pyhon instagram direct bot☆14Jul 4, 2021Updated 4 years ago
- HTTP Proxy using Amazon Lambda for source IP cycling☆15Apr 6, 2021Updated 4 years ago
- Reducing the private key through scalar multiplication using the ECPy + Google Colab library☆13Dec 7, 2022Updated 3 years ago
- In Detail Methodology of How I perform Web Pentesting☆10Oct 18, 2025Updated 5 months ago
- Misc bounty and vulndisc things☆85Jan 4, 2021Updated 5 years ago
- Network/WebApplication Information Gathering, Enumeration and Vulnerability Scanning (Under Development)☆16Feb 2, 2019Updated 7 years ago
- A tool which helps identifying client-side prototype polluting libraries☆39May 1, 2025Updated 10 months ago
- ☆33Oct 29, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Nov 8, 2024Updated last year
- ☆16Oct 31, 2024Updated last year
- Scan any HackerOne program with Nuclei☆14Sep 21, 2021Updated 4 years ago
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- AutoAR is an automated security reconnaissance tool and Discord bot for bug bounty hunters and penetration testers. It automates gatherin…☆58Updated this week
- Compilation of commands for hacking tasks and security tools as a bit of everything☆14Jul 3, 2025Updated 8 months ago
- ☆13May 12, 2019Updated 6 years ago