sickcodes / securityLinks
Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.
☆89Updated 2 years ago
Alternatives and similar repositories for security
Users that are interested in security are comparing it to the libraries listed below
Sorting:
- A formula to calculate bounty amounts.☆14Updated 7 years ago
- A list of universities with vulnerability disclosure policies☆12Updated 5 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- Scripts for Sourcegraph search results. Useful for static analysis <3☆28Updated 2 years ago
- A tiny set of helper scripts for ipinfo☆17Updated 4 years ago
- Generic cracker example which is compatible with Hashtopolis☆22Updated 4 years ago
- Bypassing AWS WAF using a single ';'☆40Updated 6 years ago
- Reconstruct javascript from a sourcemap in bash☆39Updated 3 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- The hacker technical cheat sheet☆40Updated 2 weeks ago
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- Personal Collection of Awesome Google Dorks☆30Updated 5 years ago
- An organized collection of default passwords for various devices and services.☆39Updated 2 years ago
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆32Updated 8 months ago
- Remove Offensive and Profane Words from Wordlists☆15Updated last year
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Password Lense: reveal character types in a password☆23Updated this week
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- httptools helps you to capture, repeat and live intercept HTTP requests with scripting capabilities. It is built on top of mitmproxy☆75Updated 5 months ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆88Updated last year
- Generate a personal Jekyll website using your Bibtex references.☆11Updated 5 years ago
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 3 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated last month
- It is a script written in Python that performs brute force on workers' payroll files through the use of their DNI (National Identity Docu…☆12Updated 4 years ago
- ☆23Updated last year
- Search .git folders for emails and URL's that should otherwise be hidden☆32Updated 4 years ago
- A list of universities with vulnerability disclosure policies☆50Updated 4 years ago
- ☆9Updated 2 years ago