Configuration files for desktop environment
☆24Feb 20, 2024Updated 2 years ago
Alternatives and similar repositories for DesktopEnvironment
Users that are interested in DesktopEnvironment are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits for some windows binaries :)☆51Mar 22, 2026Updated 3 weeks ago
- Exploits for some linux binaries :)☆36Nov 2, 2025Updated 5 months ago
- Two simple plugins for wireshark that can help in Network Forensics CTFs☆12Apr 21, 2025Updated 11 months ago
- Blog personal sobre resolución de CTF's, artículos y demás cosas locas en ciberseguridad :)☆16Apr 3, 2026Updated last week
- ☆16Updated this week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Log-Zapper is a linux and windows secure Log cleaner.☆22Jun 15, 2024Updated last year
- Python script to exploit CVE-2020-14321 - Moodle 3.9 - Course enrollments allowed privilege escalation from teacher role into manager rol…☆21Dec 3, 2021Updated 4 years ago
- my bspwm rice dotfiles with simple scripts☆31Oct 23, 2021Updated 4 years ago
- ☆11Apr 22, 2022Updated 3 years ago
- ☆26Apr 24, 2025Updated 11 months ago
- ☆12Jan 5, 2022Updated 4 years ago
- Pequeña guia que hice sobre el desarrollo de malware y tecnicas que son usadas☆29Feb 18, 2025Updated last year
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 5 months ago
- 🎀 Hypr WM enviroment. Joining the First Release of my Dotfiles. Nothing Awesome.☆16Jan 7, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- S4vitar's desktop enviroment automatic☆12Feb 9, 2023Updated 3 years ago
- My rice config for Bspwm 🍙🌸☆17Jul 8, 2023Updated 2 years ago
- A Collection of 88x31px GIFs☆14Jun 21, 2024Updated last year
- Dotfiles for my Arch Linux setup☆17Feb 26, 2026Updated last month
- 🛠️ In this repository you will find all the OSCP tools I created and used during the course. 🛠️☆13Dec 23, 2023Updated 2 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 5 years ago
- ☆21Jul 25, 2017Updated 8 years ago
- Leaf - Jekyll Theme☆145Jun 24, 2024Updated last year
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆21Dec 15, 2025Updated 3 months ago
- iptables rules to only have incoming connections from the machine on TryHackMe☆220Oct 28, 2021Updated 4 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- my new new dotfiles :p☆22Feb 28, 2022Updated 4 years ago
- a simple HTML/JQuery file upload system that is powered by node.js and MongoDB's GridFS☆13Aug 9, 2013Updated 12 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- Use google dork to search and download easy as gf!☆16Mar 29, 2025Updated last year
- Herramienta hecha en Bash ideal para automatizar ataques WiFi (WPA/WPA2 - PSK) destinados a la obtención de la contraseña.☆427Nov 28, 2023Updated 2 years ago
- A look at how different email closings correlate with response rate.☆12Jan 31, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- [ARCHIVED] Early work on Abyss (Windows UEFI Bootkit).☆42Aug 15, 2025Updated 7 months ago
- Msfvenom Advanced Obfuscated Payload Builder.☆32Jun 2, 2025Updated 10 months ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 7 months ago
- ☆11Dec 15, 2022Updated 3 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- CTF Writeup for Car Hacking Village, DEF CON 30 (2022)☆14Aug 16, 2022Updated 3 years ago
- A Path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager Project's Tiny File Manager <…☆13Feb 3, 2024Updated 2 years ago