A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
☆12Jun 9, 2020Updated 5 years ago
Alternatives and similar repositories for the-book-of-secret-knowledge
Users that are interested in the-book-of-secret-knowledge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Just some public notes that can be useful and i want let the world knows.☆90Oct 18, 2020Updated 5 years ago
- ☆44Apr 30, 2021Updated 4 years ago
- Blind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI☆27Jan 6, 2021Updated 5 years ago
- web cache poison - Top 1 web hacking technique of 2019☆25Feb 24, 2020Updated 6 years ago
- Um acervo de conteúdos sobre Segurança da Informação de uma forma simplificada.☆28Jun 12, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- PowerShell module providing utility commands to manipulate a APK file on Windows☆16Apr 14, 2025Updated last year
- ☆42Jul 14, 2021Updated 4 years ago
- A collection of headers containing useful tools and gadgets for building C++ programs☆11Feb 26, 2025Updated last year
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 13 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- JTAG debugging support for Allwinner SoCs☆10Mar 4, 2026Updated last month
- ☆14Aug 25, 2022Updated 3 years ago
- Vulnerability Cheatsheet☆55Apr 22, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SLE 4442 smartcard emulation on an AVR☆15Apr 20, 2020Updated 6 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- BurpSuite Extension for performing scan via CLI.☆14Dec 5, 2017Updated 8 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- CommandInWiFi: Exploiting SSID Storage in WiFi Scanning for Command Injection☆41Mar 9, 2026Updated last month
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16May 28, 2022Updated 3 years ago
- ☆14Feb 26, 2021Updated 5 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 6 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- Fast AEM scope gathering tool for all your public and private BugCrowd Programs☆10Jul 14, 2021Updated 4 years ago
- A backup of switchbrew. Click the website to go to generator ->☆14Oct 17, 2020Updated 5 years ago
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- Project website☆15Jan 2, 2023Updated 3 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.3☆12Jan 23, 2020Updated 6 years ago
- Automatically exported from code.google.com/p/smartcarddetective☆17Oct 19, 2015Updated 10 years ago
- Just simple log4j scanner☆12Dec 13, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆10Jan 21, 2019Updated 7 years ago
- ☆19Oct 4, 2021Updated 4 years ago
- Harmony 3 peripheral library application examples for PIC32MX family☆12Nov 24, 2025Updated 5 months ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- An automatic XSS scanner☆10Oct 8, 2024Updated last year
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- EPSS(Exploit Prediction Scoring System) API client☆20Oct 30, 2025Updated 5 months ago