A powerful command-line tool for downloading udemy courses.
☆77Oct 9, 2025Updated 4 months ago
Alternatives and similar repositories for cli
Users that are interested in cli are comparing it to the libraries listed below
Sorting:
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Apr 29, 2025Updated 10 months ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Dec 12, 2024Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- The PoC implementations for the Android code packing technique.☆14Jul 24, 2016Updated 9 years ago
- ☆15May 6, 2023Updated 2 years ago
- CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection☆17Jan 12, 2025Updated last year
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated last year
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆16Mar 13, 2022Updated 3 years ago
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Jul 9, 2023Updated 2 years ago
- Darkscience website☆29Jun 10, 2019Updated 6 years ago
- Hacking with PasteJacking technique☆22Jul 2, 2024Updated last year
- ⛏️ A simple page to mine monero using Coin hive☆22Sep 7, 2020Updated 5 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Jun 6, 2024Updated last year
- BlueStacks privilege escalation through VM backdooring☆21Jul 16, 2024Updated last year
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated 11 months ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- ☆12Jan 25, 2023Updated 3 years ago
- BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack☆57Apr 30, 2019Updated 6 years ago
- 🚀✨ Help subscribers understand Python + AI https://www.youtube.com/playlist?list=PLTV_nsuD2lf7JOwZdSWuup-YO0AUaDQti☆99Jan 26, 2026Updated last month
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Jun 6, 2023Updated 2 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25May 21, 2025Updated 9 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- A minimal SDK that lets an integrator add a Monero Miner using the Javascript miner created by CoinHive. The Monero Miner can be used wit…☆26Jul 27, 2018Updated 7 years ago
- ☆10Apr 29, 2023Updated 2 years ago
- Discord bot accounts / cookies subscribe bot, a discord command which sends subscribers to your account using cookies.☆11May 29, 2024Updated last year
- ☆11Sep 15, 2024Updated last year
- Welcome to Guess Testing! Ain't nobody got the time to write unit tests! But... everybody wants a 100% coverage! If you're not a QA perso…☆11Aug 30, 2022Updated 3 years ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Jun 27, 2018Updated 7 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- A CRYPTOJACKING PROGRAM (MALWARE) >:)☆40Sep 16, 2021Updated 4 years ago
- SBOM-TOOL is a ctl tool that generates software bill of materials (SBOM) for software projects through source code warehouse, code finger…☆13Oct 11, 2025Updated 4 months ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- Android Connections Forensics☆33Dec 15, 2015Updated 10 years ago