unk9vvn / unk9vvn.github.ioLinks
Cybersecurity Roadmap - Tools Installer - Check List - Methodology - Cheat Sheet
☆15Updated last week
Alternatives and similar repositories for unk9vvn.github.io
Users that are interested in unk9vvn.github.io are comparing it to the libraries listed below
Sorting:
- This repository is related to specialized books published by the THB team.☆20Updated 5 months ago
- Red Team Roadmap [defination, job positions, skills, tools]☆71Updated last year
- One proxy to rule them all☆126Updated last year
- ☆16Updated last year
- A vulnerable RESTful application written in Node and React based on OWASP API security top 10 2023 edition.☆64Updated 2 years ago
- A powerful (SSH Cracker) and efficient SSH connection testing tool written in Go. Features include multi-threaded testing, real-time prog…☆53Updated last month
- dEX is a powerful tool for transmitting OS command output over DNS. It is equipped with robust mechanisms for handling missing chunks, en…☆18Updated last year
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆16Updated last year
- A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recogniz…☆30Updated 9 months ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated last year
- A Python-based Data Analysis Tool for Examining and Visualizing Weather Patterns in Tehran. Utilizes Historical Weather Data to Provide I…☆14Updated 7 months ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆116Updated 2 weeks ago
- This is a useful Python script for extracting bug bounty or any other write-ups from every RSS.☆142Updated 2 months ago
- رایتاپهای تیم فلگ موتوری☆27Updated last month
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆25Updated 10 months ago
- MAZAPA Writeups - RedTeam Based Peetrochemical Network for Attack☆12Updated last year
- Dorsa Lab Vulnerable Web Application☆22Updated 3 years ago
- Exploits Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924).☆19Updated last year
- A place in which I put various resources from my classes, presentations, and videos.☆45Updated 2 years ago
- CorsOne - CORS Misconfiguration Discovery Tool☆25Updated last week
- functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forger…☆92Updated last year
- Reconnaissance & Footprinting framework for BugHunters & RedTeamers☆21Updated 5 months ago
- A personal list of various resources for those who are interested in learning about infosec and hacking and keeping themselves up to date…☆177Updated 6 months ago
- Domain Availability Checker☆174Updated 6 months ago
- Recon (Whois)☆15Updated 2 years ago
- Malware that we analyzed on our site.☆25Updated 2 months ago
- Application Fuzzing: Tools, Techniques, and Best Practices☆175Updated last year
- A CDN Domain Fronting Tool or Websocket Discovery written in Python☆55Updated 2 years ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆78Updated this week
- Continues Recon on Public Bug Bounty Program☆16Updated last year