☆57Jan 11, 2023Updated 3 years ago
Alternatives and similar repositories for bugbountybooks
Users that are interested in bugbountybooks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Deep learning final year projects offer students the opportunity to explore the latest advancements in artificial intelligence and apply …☆30Updated this week
- 🛡️ ClickShield is a modern, user-friendly web application that helps users identify potentially malicious websites and phishing attempts…☆14Nov 8, 2025Updated 6 months ago
- ☆24Nov 22, 2025Updated 5 months ago
- Professional Phishing Awareness & Cybersecurity Education Platform☆24Oct 17, 2025Updated 6 months ago
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- A repo to store public scan data for my bug bounty hunting framework.☆23Dec 26, 2025Updated 4 months ago
- Python scripts and tools built during my learning journey☆30Nov 14, 2025Updated 5 months ago
- HackList: Your go-to AI-powered guide to hands-on cybersecurity learning!☆24Jul 6, 2025Updated 10 months ago
- Basic tool for Information Gathering 🚀☆28Mar 26, 2024Updated 2 years ago
- This is a project to perform a BRUTE FORCE attack on a self hosted website to better the understanding of the importance of cybersecurity…☆33Jul 6, 2024Updated last year
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆53Jul 1, 2024Updated last year
- Password Manager is a simple and secure application designed to store and manage your passwords. Developed using Java, it employs AES enc…☆56Sep 10, 2024Updated last year
- Caesar Cipher☆37Oct 8, 2025Updated 7 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- My own tailored roadmap, to my web3 / smart contract auditor knowledge.☆54Jun 14, 2023Updated 2 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 13 years ago
- Cobalt Strike BOF used to perform privilege escalation by exploiting the SeImpersonate privilege. Based on the original GodPotato PoC by …☆222Apr 16, 2026Updated 3 weeks ago
- 🔐 Offensive security knowledge base — 50+ docs covering web exploitation, bug bounty, privilege escalation, CTF writeups, APT emulation,…☆204Apr 22, 2026Updated 2 weeks ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- URL Screenshot Utility☆28May 22, 2023Updated 2 years ago
- A collection of PDF/books about the modern web application security and bug bounty.☆1,860Dec 14, 2023Updated 2 years ago
- An utility to download PDB files associated with a Portable Executable (PE).☆15Feb 18, 2025Updated last year
- ☆15Jun 27, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- ☆91Sep 24, 2024Updated last year
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated 2 years ago
- Deobfuscation of XorStringsNet☆13Nov 5, 2024Updated last year
- ☆14Mar 19, 2024Updated 2 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆22Mar 20, 2025Updated last year
- ☆12Mar 28, 2026Updated last month
- The all-in-one hacking toolbox for hardware penetration testing.☆19Jun 4, 2024Updated last year
- Demo repository for running eBPF in GitHub Actions☆23Mar 27, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- vulnerable APIs inspired by https://github.com/mattvaldes/vulnerable-api☆13Dec 8, 2021Updated 4 years ago
- Session material from my conference presentation at Live360\Techmentor in Orlando,November 2023☆11Nov 14, 2023Updated 2 years ago
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Feb 28, 2025Updated last year
- A Golang CLI for the MITRE ATT&CK Framework