☆54Jan 11, 2023Updated 3 years ago
Alternatives and similar repositories for bugbountybooks
Users that are interested in bugbountybooks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Nov 22, 2025Updated 4 months ago
- Professional Phishing Awareness & Cybersecurity Education Platform☆24Oct 17, 2025Updated 6 months ago
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated 2 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- HackList: Your go-to AI-powered guide to hands-on cybersecurity learning!☆24Jul 6, 2025Updated 9 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Basic tool for Information Gathering 🚀☆26Mar 26, 2024Updated 2 years ago
- This repository holds some very beginner projects that I worked on related to cybersecurity.☆24Sep 23, 2024Updated last year
- a simple keylogger in python that sends the keystrokes to the server (Telegram)☆23Apr 8, 2026Updated last week
- This is a project to perform a BRUTE FORCE attack on a self hosted website to better the understanding of the importance of cybersecurity…☆32Jul 6, 2024Updated last year
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆53Jul 1, 2024Updated last year
- Password Manager is a simple and secure application designed to store and manage your passwords. Developed using Java, it employs AES enc…☆55Sep 10, 2024Updated last year
- Caesar Cipher☆36Oct 8, 2025Updated 6 months ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 13 years ago
- ScareCrow loader binary source which easier to read and learn☆25Apr 14, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- An utility to download PDB files associated with a Portable Executable (PE).☆15Feb 18, 2025Updated last year
- ☆15Jun 27, 2024Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Wi-Fi Deauther is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deau…☆57Nov 2, 2023Updated 2 years ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- Deobfuscation of XorStringsNet☆13Nov 5, 2024Updated last year
- ☆14Mar 19, 2024Updated 2 years ago
- Detecting cryptocurrency-related communications in network traffic☆11Apr 5, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆21Mar 20, 2025Updated last year
- ☆12Mar 28, 2026Updated 3 weeks ago
- Demo repository for running eBPF in GitHub Actions☆23Mar 27, 2025Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- vulnerable APIs inspired by https://github.com/mattvaldes/vulnerable-api☆13Dec 8, 2021Updated 4 years ago
- Session material from my conference presentation at Live360\Techmentor in Orlando,November 2023☆11Nov 14, 2023Updated 2 years ago
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- A Golang CLI for the MITRE ATT&CK Framework☆14Apr 28, 2025Updated 11 months ago
- Examples of self-modifying x86 linux assembly☆11Dec 20, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 6 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Golang bindings for PE-sieve☆42Nov 11, 2023Updated 2 years ago
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆18Mar 19, 2025Updated last year
- ☆12Sep 27, 2017Updated 8 years ago
- ☆14Aug 19, 2023Updated 2 years ago
- SMTP Open Relay Exploitation☆16Nov 23, 2020Updated 5 years ago