Bitrix vulnerability scanner
☆23Mar 28, 2023Updated 2 years ago
Alternatives and similar repositories for quick-tricks
Users that are interested in quick-tricks are comparing it to the libraries listed below
Sorting:
- Check bitrix vulnerabilities☆91Jan 22, 2024Updated 2 years ago
- ☆11Jan 14, 2021Updated 5 years ago
- ☆17Feb 20, 2026Updated last week
- Simple login application in Flask for user session management without login extensions.☆11Mar 8, 2022Updated 3 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Zero Setup is a Bash script that automates the installation process of all the personal tools and software you need on your system. It s…☆12Nov 19, 2023Updated 2 years ago
- Ask ChatGPT directly from the Chrome address bar (omnibox)☆10Mar 23, 2023Updated 2 years ago
- POC for checking multiple hosts for Zerologon vulnerability☆11Oct 5, 2020Updated 5 years ago
- An imap mail checker for custom servers☆12Apr 26, 2025Updated 10 months ago
- combo lists for dev testing☆11Jan 15, 2019Updated 7 years ago
- Diving into Popularity of GitHub Repositories☆13Sep 15, 2023Updated 2 years ago
- Ghidra's development plugins, scripts, contributing. Presentation☆13Aug 10, 2020Updated 5 years ago
- A collection of tools for the Janus exploit [CVE-2017-13156].☆10Oct 22, 2019Updated 6 years ago
- This Python tool uses PimEyes for reverse image searches, returning links to pages where matches are found, useful for investigations and…☆11Sep 12, 2024Updated last year
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- ☆13Nov 3, 2023Updated 2 years ago
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆17Feb 20, 2026Updated last week
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- ☆16Aug 20, 2017Updated 8 years ago
- Socks5 & Socks4 & HTTPS IP:PORT proxy list are updated occasionally. Proxy list source links & API links☆12Apr 7, 2025Updated 10 months ago
- Username recon OSINT. Accurate hits! New sites to check, Simple and powerful tool. Goverments use this tool or similar tools built in dif…☆18Feb 19, 2026Updated last week
- Reverse SSH C2☆29Sep 19, 2025Updated 5 months ago
- Sleep obfuscation in golang based on ekko☆13Jan 16, 2024Updated 2 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- ☆12Jan 10, 2025Updated last year
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.☆12Feb 19, 2026Updated last week
- Attack-defense CTF training organized by dtl on 23 Jul, 2023☆12Jul 24, 2023Updated 2 years ago
- The FreeBSD ICMP buffer overflow, freebsd buffer overflow poc☆10Apr 28, 2025Updated 10 months ago
- minica2 is a small, simple CA intended for use in situations where the CA operator also operates each host where a certificate will be us…☆12Dec 17, 2022Updated 3 years ago
- GDB plug-in based on PWNDBG, GEF and PEDA that makes debugging MIPS with GDB suck less☆16Sep 18, 2024Updated last year
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- Burp suite extension to find sensitive information by checking incoming text OR binary websocket messages☆56Jan 14, 2025Updated last year
- ☆74Nov 28, 2025Updated 3 months ago
- download higher resolution photo from vk.com☆10Aug 30, 2021Updated 4 years ago
- ☆12Feb 20, 2022Updated 4 years ago
- Setting up a Windows Event Collector☆12Aug 7, 2023Updated 2 years ago
- About PIVOting☆13Dec 19, 2023Updated 2 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆15Sep 4, 2019Updated 6 years ago
- Automate Burp Suite Professional setup on macOS with multi-version support, JDK 21, built-in keygen, and instant launcher for pentesters …☆21Sep 27, 2025Updated 5 months ago