Slides and demo code for past presentations
☆12Feb 17, 2022Updated 4 years ago
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- Exploits and research stuffs☆54Jan 19, 2026Updated 2 months ago
- Extract domain from SSL Information☆15Nov 23, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Network based protocol fuzzer☆74Feb 17, 2022Updated 4 years ago
- A Burp Suite extension to parse Content-Transfer-Encoding: quoted-printable emails received in Burpcollaborator's SMTP☆30Aug 8, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Apr 25, 2022Updated 3 years ago
- A simple storage class inspired by the redis api on top of Sqlite.☆16Dec 8, 2015Updated 10 years ago
- Self contained phish endpoint generator and web server.☆11Mar 5, 2015Updated 11 years ago
- simple storage helper inspired by the redis api☆19Jun 30, 2016Updated 9 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Faker for Snowflake!☆33Dec 21, 2022Updated 3 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Subdomain enumeration statistics and wordlists from bugbounty scopes.☆34Mar 24, 2022Updated 3 years ago
- ☆10Feb 25, 2021Updated 5 years ago
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated 11 months ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Nov 9, 2021Updated 4 years ago
- Proof of Concept for a VSCode Python Extension Code Execution Vulnerability☆16Mar 17, 2020Updated 6 years ago
- I will share my bug bounty tips here☆32Mar 6, 2023Updated 3 years ago
- an autodialer written in nodejs using the twilio api (not functional)☆11Mar 8, 2015Updated 11 years ago
- Skeleton project for your own GRUB-based bootkit☆17Jan 11, 2020Updated 6 years ago
- Configuration files of my old Arch Linux+Xmonad based setup☆16Apr 7, 2017Updated 8 years ago
- GH-Takeover — GitHub Pages Sub-domain Takeover Automation!☆28Apr 17, 2021Updated 4 years ago
- Simplifies and automates the handeling of tags and tag maps.☆16Nov 16, 2010Updated 15 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Simple LSTM language modelling toolkit☆10Oct 21, 2022Updated 3 years ago
- Deep learning model of machine translation using attentional and structural biases☆13Jul 21, 2017Updated 8 years ago
- Click heatmaps with Google Analytics☆36Aug 21, 2013Updated 12 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- Static Analysis Results Interchange Format (SARIF) For OCaml☆14Mar 13, 2025Updated last year
- InSpec profile for compliance with AEM security checklist☆10May 7, 2024Updated last year
- Open Security Controls Assessment Language Toolbox☆18Feb 4, 2026Updated last month
- burp插件开发笔记☆11Dec 26, 2021Updated 4 years ago
- A collection of captured SSH login credentials☆17Mar 28, 2021Updated 4 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago