e2e Scanning research module
☆22Mar 8, 2026Updated last week
Alternatives and similar repositories for rek
Users that are interested in rek are comparing it to the libraries listed below
Sorting:
- ☆10Feb 23, 2022Updated 4 years ago
- Advanced mobile security research platform for authorized testing and educational purposes☆13Oct 4, 2025Updated 5 months ago
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- 🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty…☆46Mar 5, 2026Updated 2 weeks ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- Static-Code-Analysis-Helper helps you perform static code analysis.☆32Feb 20, 2026Updated last month
- Minimalistic Keyboard Driven Browser 🌐🎀☆14May 21, 2025Updated 9 months ago
- Ungraded practice exercises for python scripting for security course.☆12Jun 22, 2025Updated 8 months ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- FlatBlur is a flat, minimal, blurried, mid-dark Kvantum theme.☆12Sep 23, 2019Updated 6 years ago
- androi demo for mvp☆11Sep 24, 2016Updated 9 years ago
- ☆27Dec 8, 2018Updated 7 years ago
- HTTP Header Analysis Vulnerability Tool☆14May 6, 2022Updated 3 years ago
- Fast tool to lookup list of IP adresses☆14Oct 5, 2022Updated 3 years ago
- Notes for OSCP & CPTS.☆74Mar 12, 2026Updated last week
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 7 months ago
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 6 months ago
- OSINT tool for researching targets based on Email Address or Username using SerperDev, Firecrawl, HIBP & OSINT Industries APIs, and OpenA…☆16Sep 17, 2024Updated last year
- CVE-2025-3248 Langflow RCE Exploit☆16Jun 17, 2025Updated 9 months ago
- A minimalist microblogging platform 🐦🔇☆10Updated this week
- Simple UPI & PayPal Details Page with Click-to-Copy functionality to receive UPI and PayPal Donations.☆14Jan 22, 2025Updated last year
- Just "Harmless" Google dorks for bug hunters☆22Nov 25, 2024Updated last year
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 8 months ago
- Dependency graph generator for C++ code.☆19Feb 1, 2019Updated 7 years ago
- Example of WatchFaceDecomposition implementation for Wear OS watch face.☆11Jun 21, 2020Updated 5 years ago
- Phantom is project created to perform loading and executing .NET assemblies directly in memory within an IIS environment running in full‑…☆68Mar 10, 2026Updated last week
- Helm charts for deploying Malcolm☆16Mar 12, 2026Updated last week
- Slides, codes, and materials related to my courses☆16Dec 19, 2025Updated 3 months ago
- ☆13Nov 29, 2024Updated last year
- All key information of each module and more of Hackthebox Academy CPTS job role path. Solutions and walkthroughs for each question and ea…☆40Dec 15, 2025Updated 3 months ago
- ☆19Jul 9, 2021Updated 4 years ago
- Creating a Fake WhatsApp Message via SQLite: Understanding the Logic Behind the Manipulation☆38Jul 28, 2025Updated 7 months ago
- A comprehensive guide on SSH penetration testing techniques and methodologies. Authored by Abhinav Sharma, founder and CEO of Global Offe…☆12Jul 1, 2023Updated 2 years ago
- This is the repo for Taskfile demo☆12Aug 10, 2024Updated last year
- list of usernames and email addresses for pentests☆198Aug 14, 2022Updated 3 years ago
- An unofficial wrapper for the HackerOne API☆17Apr 14, 2025Updated 11 months ago
- JioFiber-API is an unofficial Python package for JioRouters for Stats and configuration.☆11Aug 6, 2021Updated 4 years ago
- Subdomain Scanner - the most exhaustive tool for sub-domain recognition and mapping to related IPs and ASNs☆18Jul 4, 2025Updated 8 months ago
- DoS Attacks on Bluetooth Devices for pentest purposes☆32Nov 22, 2025Updated 3 months ago