gitbook of all pentesting knowledge
☆21May 1, 2023Updated 2 years ago
Alternatives and similar repositories for Infosec-Corruption
Users that are interested in Infosec-Corruption are comparing it to the libraries listed below
Sorting:
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆12Feb 19, 2022Updated 4 years ago
- Attempt to grind out the 100 offsec project challenges, conceptualized by github user, @kurogai, at his repo [https://github.com/kurogai/…☆15Jul 16, 2024Updated last year
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've …☆61Jun 20, 2025Updated 8 months ago
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Feb 25, 2026Updated last week
- This repository contains implementations of various sorting algorithms. Sorting is a fundamental operation in computer science, and unde…☆10Apr 28, 2023Updated 2 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆13Aug 26, 2023Updated 2 years ago
- More metadata and stats for Ethereum Improvement Proposal (https://eips.ethereum.org)☆12Oct 22, 2024Updated last year
- SSRF 绕过 Payload☆15Nov 12, 2020Updated 5 years ago
- React Segmented Controls☆15Dec 22, 2025Updated 2 months ago
- List of XSS Payloads☆15Jul 5, 2022Updated 3 years ago
- CryptoChecker with bunch of features. Seedphrase checker, Metamask, Brave, Ronin, Binance Chain, Exodus, Atomic wallets. NFT & Airdrops c…☆36May 15, 2025Updated 9 months ago
- cybersecurity conference materials☆15Sep 1, 2019Updated 6 years ago
- Unique wordlist generator of unique wordlists.☆41Jul 20, 2023Updated 2 years ago
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- 🃏 Creation of the Top Trumps game where the theme and cards were inspired by great names responsible for the technology revolution and I…☆24Jan 21, 2025Updated last year
- Dotfiles for my Arch Linux setup☆17Updated this week
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Feb 18, 2021Updated 5 years ago
- "Hacks" for online blooket games. Does not require outside information (ie. url, gamepin, sign in information) blooket hacks☆13Jan 25, 2024Updated 2 years ago
- Hidden input parameters finder☆19Jul 10, 2023Updated 2 years ago
- grapX will iterate through the URLs and grep the endpoints with all possible extensions.☆56Mar 23, 2021Updated 4 years ago
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)☆32Jun 15, 2020Updated 5 years ago
- Fun wiz ya telly.... H4xxt00lZ☆28Oct 27, 2024Updated last year
- Public OSINT data☆32Mar 10, 2021Updated 4 years ago
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆75Jan 25, 2025Updated last year
- SpinSight Roulette AI Is a powerful machine-learning model trained on thousands of hours of Roulette gameplay, analyzes real-time ball tr…☆17Jul 1, 2025Updated 8 months ago
- Descripción del perfil☆11May 27, 2024Updated last year
- https://bloxluck.com's source code, its a mm2 gambling website, make sure to set everything up in the php files, the owner exited, and he…☆10Sep 16, 2022Updated 3 years ago
- Cross government data share platform☆10Oct 18, 2023Updated 2 years ago
- Flash USDT transaction (core network) is a software designed to enable you send fake USDT from any wallet address to another wallet addre…☆17Feb 24, 2024Updated 2 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- This is the repository for the Null-Byte suite to pull modules from.☆32Mar 28, 2016Updated 9 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆33Nov 8, 2021Updated 4 years ago
- A python3 intruder that gave me bounties, easy to use and as fast as fuff☆38Oct 31, 2020Updated 5 years ago
- ☆41Apr 27, 2023Updated 2 years ago
- Containerized TopSAP (SSL VPN) client from topsec.com.cn.☆11Apr 19, 2023Updated 2 years ago
- Práctica 2 del Taller de Git y GitHub de 42 Málaga☆12Oct 10, 2024Updated last year
- A proof of concept of a PHP Miner that can mine DuinoCoin☆10Apr 4, 2022Updated 3 years ago
- ☆15Feb 24, 2026Updated last week