☆21Mar 12, 2022Updated 4 years ago
Alternatives and similar repositories for Linux-Commands-Mindmap
Users that are interested in Linux-Commands-Mindmap are comparing it to the libraries listed below
Sorting:
- ☆15Apr 4, 2022Updated 3 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Apr 8, 2022Updated 3 years ago
- Easy setup for Halo2 ZK circuits☆15Jun 6, 2024Updated last year
- Zabbix - SAML SSO Authentication Bypass☆15Mar 31, 2022Updated 3 years ago
- A python script that finds endpoints in JavaScript files☆10Nov 29, 2019Updated 6 years ago
- ☆13Dec 4, 2023Updated 2 years ago
- ☆10Jul 29, 2022Updated 3 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- ☆11Jun 5, 2022Updated 3 years ago
- ☆16May 3, 2021Updated 4 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆14Oct 29, 2019Updated 6 years ago
- Ciphers implemented in python [This is not a serious project. Just an attempt to learn python]☆10May 20, 2018Updated 7 years ago
- This is the Ultimate Windows 10 Script & Gaming Mod from a creation from multiple debloat scripts and gists from github.☆20Jan 12, 2022Updated 4 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Tutorial on Full Stack application using Python Django and React JS☆16Mar 13, 2024Updated 2 years ago
- ☆10Mar 22, 2023Updated 3 years ago
- Script for Reconnaissance(Bug Bounty)☆18May 15, 2022Updated 3 years ago
- ☆17May 21, 2022Updated 3 years ago
- A collection of useful aggressor scripts. All credits due to its authors.☆12Jul 5, 2019Updated 6 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Vaf is a cross-platform very advanced and fast web fuzzer written in nim☆320May 29, 2022Updated 3 years ago
- Public Code for ICS Evasion Attack Generation☆44Apr 23, 2021Updated 4 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- ☆16Mar 1, 2023Updated 3 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- ☆18Apr 30, 2025Updated 10 months ago
- System to manage large-scale college fest. With functionalities like registration, payment, attendance, winner, certificate distribution☆17Nov 1, 2022Updated 3 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆46Sep 28, 2022Updated 3 years ago
- Slides and code for talks given at conferences / meetups☆17Jan 14, 2026Updated 2 months ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Steal users password with a fake sudo function.☆43Feb 29, 2024Updated 2 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Nov 2, 2024Updated last year
- Scripts for Sourcegraph search results. Useful for static analysis <3☆28Jun 30, 2023Updated 2 years ago
- Google Places Autocomplete & Reverse Geocoding☆15May 30, 2021Updated 4 years ago
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago