☆15Apr 4, 2022Updated 3 years ago
Alternatives and similar repositories for vim-cheatsheet
Users that are interested in vim-cheatsheet are comparing it to the libraries listed below
Sorting:
- A quick reference for understanding the nature and severity of vulnerabilities in TLS configurations and implementations.☆29Apr 6, 2020Updated 5 years ago
- ☆24Feb 7, 2025Updated last year
- ☆29Jan 15, 2017Updated 9 years ago
- My Tools For Bug Bounty☆69Sep 23, 2024Updated last year
- Learn DevOps Helm/Helmfile Kubernetes deployment☆11May 13, 2020Updated 5 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Starter Projects for the Docker Course☆11Dec 25, 2025Updated 2 months ago
- OWASP Coimbatore's Web & Project Repository☆13Jan 23, 2026Updated last month
- ☆101Oct 18, 2023Updated 2 years ago
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- ☆10Jan 25, 2023Updated 3 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- ☆10May 6, 2017Updated 8 years ago
- Collection of resources for responding to the Log4j set of vulnerabilities.☆11Feb 22, 2022Updated 4 years ago
- check if the source code compressed and uploaded to the server by mistake☆10Feb 21, 2022Updated 4 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- ☆10May 12, 2017Updated 8 years ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated 2 weeks ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- Source code related of the articles posted in medium.com☆12Nov 2, 2020Updated 5 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- My blog☆10Oct 6, 2025Updated 4 months ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- Puppet Guide☆10Jan 2, 2022Updated 4 years ago
- https://z-r0crypt.github.io☆11May 3, 2024Updated last year
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- A set of scripts to help automate the management of Burp Collaborator☆12Sep 5, 2025Updated 5 months ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated last month
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 5 years ago
- re-hosted web identiy course from opensecuritytraining.info☆11Nov 7, 2025Updated 3 months ago
- Presentaciones de congresos☆55Jun 21, 2024Updated last year
- Simple Webserver Implementation using Sockets☆15Dec 8, 2022Updated 3 years ago