☆48Jan 11, 2023Updated 3 years ago
Alternatives and similar repositories for bugbountybooks
Users that are interested in bugbountybooks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🛡️ ClickShield is a modern, user-friendly web application that helps users identify potentially malicious websites and phishing attempts…☆14Nov 8, 2025Updated 4 months ago
- Professional Phishing Awareness & Cybersecurity Education Platform☆24Oct 17, 2025Updated 5 months ago
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated 2 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- A VSCode extension to adjust checksums after changes to core files☆28Sep 9, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- HackList: Your go-to AI-powered guide to hands-on cybersecurity learning!☆24Jul 6, 2025Updated 8 months ago
- Basic tool for Information Gathering 🚀☆23Mar 26, 2024Updated 2 years ago
- This repository holds some very beginner projects that I worked on related to cybersecurity.☆24Sep 23, 2024Updated last year
- a simple keylogger in python that sends the keystrokes to the server (Telegram)☆23Aug 18, 2025Updated 7 months ago
- This is a project to perform a BRUTE FORCE attack on a self hosted website to better the understanding of the importance of cybersecurity…☆32Jul 6, 2024Updated last year
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆52Jul 1, 2024Updated last year
- Password Manager is a simple and secure application designed to store and manage your passwords. Developed using Java, it employs AES enc…☆55Sep 10, 2024Updated last year
- My own tailored roadmap, to my web3 / smart contract auditor knowledge.☆52Jun 14, 2023Updated 2 years ago
- Caesar Cipher☆35Oct 8, 2025Updated 5 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Kerberos TGS_REP cracker written in Golang☆57Nov 18, 2015Updated 10 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 12 years ago
- ScareCrow loader binary source which easier to read and learn☆25Apr 14, 2022Updated 3 years ago
- AI/ML/LLM Penetration Testing Toolkit by Mr-Infect — the #1 GitHub resource for AI security, red teaming, and adversarial ML techniques.…☆132Feb 19, 2026Updated last month
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- Windows hack programming skills and common modules / Windows hack 编程技巧及通用模块☆23Dec 8, 2019Updated 6 years ago
- A collection of PDF/books about the modern web application security and bug bounty.☆1,805Dec 14, 2023Updated 2 years ago
- An utility to download PDB files associated with a Portable Executable (PE).☆15Feb 18, 2025Updated last year
- ☆15Jun 27, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- ☆85Sep 24, 2024Updated last year
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- ☆14Mar 19, 2024Updated 2 years ago
- Detecting cryptocurrency-related communications in network traffic☆12Apr 5, 2020Updated 5 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆19Mar 20, 2025Updated last year
- ☆12Mar 20, 2026Updated last week
- A curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆78Dec 3, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The all-in-one hacking toolbox for hardware penetration testing.☆18Jun 4, 2024Updated last year
- Demo repository for running eBPF in GitHub Actions☆23Mar 27, 2025Updated last year
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆27Aug 17, 2021Updated 4 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Feb 28, 2025Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- vulnerable APIs inspired by https://github.com/mattvaldes/vulnerable-api☆13Dec 8, 2021Updated 4 years ago
- Session material from my conference presentation at Live360\Techmentor in Orlando,November 2023☆11Nov 14, 2023Updated 2 years ago