Configuration files for desktop environment
☆24Feb 20, 2024Updated 2 years ago
Alternatives and similar repositories for DesktopEnvironment
Users that are interested in DesktopEnvironment are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits for some windows binaries :)☆51Updated this week
- Exploits for some linux binaries :)☆37Nov 2, 2025Updated 4 months ago
- Two simple plugins for wireshark that can help in Network Forensics CTFs☆12Apr 21, 2025Updated 11 months ago
- Blog personal sobre resolución de CTF's, artículos y demás cosas locas en ciberseguridad :)☆16Mar 2, 2026Updated 3 weeks ago
- Automated script to install bspwm in Linux☆16Feb 6, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆16Mar 15, 2026Updated last week
- Log-Zapper is a linux and windows secure Log cleaner.☆22Jun 15, 2024Updated last year
- Python script to exploit CVE-2020-14321 - Moodle 3.9 - Course enrollments allowed privilege escalation from teacher role into manager rol…☆20Dec 3, 2021Updated 4 years ago
- My ~/.config☆28Jul 10, 2022Updated 3 years ago
- HackTheBox rich presence for Discord☆13May 30, 2024Updated last year
- my bspwm rice dotfiles with simple scripts☆31Oct 23, 2021Updated 4 years ago
- PenKraken, herramienta de automatizacion de hacking Etico / Pentesting☆12Jun 14, 2024Updated last year
- ☆11Apr 22, 2022Updated 3 years ago
- ☆15Mar 25, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆26Apr 24, 2025Updated 11 months ago
- Página web personal. Artículos sobre ciberseguridad, CTFs e investigaciones.☆403Mar 14, 2023Updated 3 years ago
- ☆12Jan 5, 2022Updated 4 years ago
- Script to install in a Fedora OS the main tools used in pentesting.☆16Nov 22, 2021Updated 4 years ago
- Pequeña guia que hice sobre el desarrollo de malware y tecnicas que son usadas☆29Feb 18, 2025Updated last year
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 4 months ago
- 🎀 Hypr WM enviroment. Joining the First Release of my Dotfiles. Nothing Awesome.☆16Jan 7, 2022Updated 4 years ago
- My rice config for Bspwm 🍙🌸☆17Jul 8, 2023Updated 2 years ago
- A Collection of 88x31px GIFs☆14Jun 21, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 🛠️ In this repository you will find all the OSCP tools I created and used during the course. 🛠️☆13Dec 23, 2023Updated 2 years ago
- Exfiltrate all saved Wi-Fi passwords from a Windows PC☆13Sep 14, 2023Updated 2 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- ☆10Apr 14, 2023Updated 2 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 3 months ago
- iptables rules to only have incoming connections from the machine on TryHackMe☆223Oct 28, 2021Updated 4 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- a simple HTML/JQuery file upload system that is powered by node.js and MongoDB's GridFS☆13Aug 9, 2013Updated 12 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A look at how different email closings correlate with response rate.☆12Jan 31, 2017Updated 9 years ago
- Msfvenom Advanced Obfuscated Payload Builder.☆32Jun 2, 2025Updated 9 months ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 6 months ago
- ☆11Dec 15, 2022Updated 3 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- A Path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager Project's Tiny File Manager <…☆13Feb 3, 2024Updated 2 years ago
- CTF Writeup for Car Hacking Village, DEF CON 30 (2022)☆12Aug 16, 2022Updated 3 years ago