My talks...
☆25Feb 27, 2025Updated last year
Alternatives and similar repositories for Talks
Users that are interested in Talks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现☆15Sep 8, 2023Updated 2 years ago
- RFM69 ISM Transceiver driver for esp-idf☆11Feb 27, 2026Updated 3 weeks ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- List of custom Nuclei templates☆16Nov 4, 2023Updated 2 years ago
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- Advanced test for proxy & waf☆14Feb 10, 2026Updated last month
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆37Feb 15, 2026Updated last month
- ☆21Oct 28, 2021Updated 4 years ago
- 🌎 Multi-threaded top level domain fuzzer. Discover already existed and available domains and subdomains!☆19Jan 12, 2026Updated 2 months ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆236Feb 1, 2022Updated 4 years ago
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆29Nov 7, 2023Updated 2 years ago
- Security Advisories☆38Feb 8, 2026Updated last month
- ☆18Apr 3, 2023Updated 2 years ago
- Cyber Security Challenge Australia 2014 Files☆18May 9, 2014Updated 11 years ago
- ☆17Feb 3, 2026Updated last month
- Find related domains of a given domain.☆104Aug 5, 2023Updated 2 years ago
- ☆12Feb 18, 2022Updated 4 years ago
- Script to read input from stdin and encode it☆19Aug 23, 2023Updated 2 years ago
- A collection of js analysis tools & scripts.☆19Mar 8, 2026Updated 2 weeks ago
- Curated Collection of Popular Community Rules for Semgrep☆18Dec 27, 2023Updated 2 years ago
- BOR - Break On Request, is a burp extension that provides a custom context menu for marking requests to be stopped by the interceptor wit…☆13Nov 18, 2022Updated 3 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆58Mar 2, 2022Updated 4 years ago
- ☆15Jul 13, 2023Updated 2 years ago
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆56Oct 23, 2024Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- Script for downloading Burp Suite extension files☆11Jan 29, 2024Updated 2 years ago
- stdin writes to slack☆14Feb 8, 2020Updated 6 years ago
- ☆14Dec 13, 2021Updated 4 years ago
- ☆20Jun 26, 2024Updated last year
- Will share some interesting writeups here :)☆18Oct 18, 2023Updated 2 years ago
- A plugin for IDA Pro and Cheat Engine to get the offset of the current module☆11May 30, 2024Updated last year
- 一款简单的qvm管理工具☆24Aug 5, 2023Updated 2 years ago
- Search for sensitive data in Postman public library.☆212Aug 28, 2025Updated 6 months ago
- cmd tools for AWD☆14Jun 10, 2023Updated 2 years ago
- Extract GraphQL operations from javascript☆23Updated this week
- ☆198Jan 18, 2023Updated 3 years ago