zeroc00I / the-book-of-secret-knowledgeView external linksLinks
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
☆12Jun 9, 2020Updated 5 years ago
Alternatives and similar repositories for the-book-of-secret-knowledge
Users that are interested in the-book-of-secret-knowledge are comparing it to the libraries listed below
Sorting:
- Just some public notes that can be useful and i want let the world knows.☆88Oct 18, 2020Updated 5 years ago
- ☆44Apr 30, 2021Updated 4 years ago
- Blind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI☆26Jan 6, 2021Updated 5 years ago
- web cache poison - Top 1 web hacking technique of 2019☆25Feb 24, 2020Updated 5 years ago
- JTAG debugging support for Allwinner SoCs☆10May 2, 2024Updated last year
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- ☆13Feb 26, 2021Updated 4 years ago
- ☆42Jul 14, 2021Updated 4 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆19Updated this week
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated last year
- Solutions from @PortSwigger labs☆12Apr 11, 2024Updated last year
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Harmony 3 peripheral library application examples for PIC32MX family☆12Nov 24, 2025Updated 2 months ago
- An automatic XSS scanner☆10Oct 8, 2024Updated last year
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- Exploit for Joomla JCK Editor 6.4.4 (CVE-2018-17254)☆10Apr 17, 2021Updated 4 years ago
- All in one tool for ethical hacking and pen testing.☆13May 22, 2023Updated 2 years ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- State of vulnerabilties report☆11Feb 20, 2020Updated 5 years ago
- ⚙️ Converts NDJson format data into CSV☆21Dec 15, 2024Updated last year
- tp-link Decrypt/Crypt Config files☆15Oct 25, 2022Updated 3 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.3☆12Jan 23, 2020Updated 6 years ago
- A collection of random scripts.☆10Jul 20, 2015Updated 10 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- ☆14Aug 25, 2022Updated 3 years ago
- Master Kali Linux, Excel in Offensive Security☆31Jun 15, 2025Updated 8 months ago
- Deeply Embeddable bare-metal C++ standard library☆13Feb 16, 2025Updated last year
- All statistical models / machine learning / computer vision / financial models / NLP / PySpark / python techniques / library tutorials ca…☆11Nov 26, 2022Updated 3 years ago
- Accepts a domain name and queries multiple sources to return subdomains. Includes option to scan the returned subdomains to check connect…☆14Aug 9, 2019Updated 6 years ago
- The yaml documents for the CTFman search system.☆12May 16, 2019Updated 6 years ago
- Filter bypass for php shell upload using exiftool and injecting code into an existing image☆13Jan 28, 2021Updated 5 years ago
- Python Remote Administration Tool☆14Jan 8, 2017Updated 9 years ago
- SLE 4442 smartcard emulation on an AVR☆14Apr 20, 2020Updated 5 years ago
- ☆10Jan 23, 2018Updated 8 years ago
- An Ethereum blockchain explorer built with React.js☆10Dec 4, 2017Updated 8 years ago
- Project website☆15Jan 2, 2023Updated 3 years ago