e2e Scanning research module
☆25Mar 26, 2026Updated last month
Alternatives and similar repositories for rek
Users that are interested in rek are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Feb 23, 2022Updated 4 years ago
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- Static-Code-Analysis-Helper helps you perform static code analysis.☆32Feb 20, 2026Updated 2 months ago
- Minimalistic Keyboard Driven Browser 🌐🎀☆14May 21, 2025Updated 11 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Comprehensive MCP server for bug bounty hunting and web application penetration testing☆29Sep 13, 2025Updated 7 months ago
- Ungraded practice exercises for python scripting for security course.☆12Jun 22, 2025Updated 10 months ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- FlatBlur is a flat, minimal, blurried, mid-dark Kvantum theme.☆12Sep 23, 2019Updated 6 years ago
- androi demo for mvp☆11Sep 24, 2016Updated 9 years ago
- ☆27Dec 8, 2018Updated 7 years ago
- HTTP Header Analysis Vulnerability Tool☆14May 6, 2022Updated 3 years ago
- Fast tool to lookup list of IP adresses☆14Oct 5, 2022Updated 3 years ago
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 7 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆22Aug 2, 2025Updated 8 months ago
- Notes for OSCP & CPTS.☆82Apr 21, 2026Updated last week
- CVE-2025-3248 Langflow RCE Exploit☆17Jun 17, 2025Updated 10 months ago
- A minimalist microblogging platform 🐦🔇☆10Apr 21, 2026Updated last week
- Simple UPI & PayPal Details Page with Click-to-Copy functionality to receive UPI and PayPal Donations.☆14Jan 22, 2025Updated last year
- Just "Harmless" Google dorks for bug hunters☆23Nov 25, 2024Updated last year
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 9 months ago
- Dependency graph generator for C++ code.☆19Feb 1, 2019Updated 7 years ago
- Example of WatchFaceDecomposition implementation for Wear OS watch face.☆11Jun 21, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆13Nov 29, 2024Updated last year
- Slides, codes, and materials related to my courses☆16Dec 19, 2025Updated 4 months ago
- All key information of each module and more of Hackthebox Academy CPTS job role path. Solutions and walkthroughs for each question and ea…☆46Apr 22, 2026Updated last week
- ☆19Jul 9, 2021Updated 4 years ago
- This is the repo for Taskfile demo☆12Aug 10, 2024Updated last year
- A comprehensive guide on SSH penetration testing techniques and methodologies. Authored by Abhinav Sharma, founder and CEO of Global Offe…☆12Jul 1, 2023Updated 2 years ago
- An unofficial wrapper for the HackerOne API☆16Apr 14, 2025Updated last year
- list of usernames and email addresses for pentests☆207Aug 14, 2022Updated 3 years ago
- JioFiber-API is an unofficial Python package for JioRouters for Stats and configuration.☆12Aug 6, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty…☆60Mar 5, 2026Updated last month
- Creating a Fake WhatsApp Message via SQLite: Understanding the Logic Behind the Manipulation☆40Jul 28, 2025Updated 9 months ago
- Subdomain Scanner - the most exhaustive tool for sub-domain recognition and mapping to related IPs and ASNs☆18Jul 4, 2025Updated 9 months ago
- DoS Attacks on Bluetooth Devices for pentest purposes☆34Nov 22, 2025Updated 5 months ago
- Exfiltrate data using ping and PowerShell, no admin access required☆15Mar 26, 2024Updated 2 years ago
- Advanced mobile security research platform for authorized testing and educational purposes☆45Oct 4, 2025Updated 6 months ago
- Enigma Machine in C☆13Nov 1, 2024Updated last year