A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
☆12Jun 9, 2020Updated 5 years ago
Alternatives and similar repositories for the-book-of-secret-knowledge
Users that are interested in the-book-of-secret-knowledge are comparing it to the libraries listed below
Sorting:
- Just some public notes that can be useful and i want let the world knows.☆88Oct 18, 2020Updated 5 years ago
- ☆44Apr 30, 2021Updated 4 years ago
- Blind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI☆27Jan 6, 2021Updated 5 years ago
- web cache poison - Top 1 web hacking technique of 2019☆25Feb 24, 2020Updated 6 years ago
- NetGun is a free and open source tool for Vulnerability Assessment, port scanning, services enumeration, misconfigurations testing and CV…☆12Jul 25, 2024Updated last year
- Public release for b01lers CTF 2021. Thanks for playing!☆10Apr 10, 2021Updated 4 years ago
- Um acervo de conteúdos sobre Segurança da Informação de uma forma simplificada.☆28Jun 12, 2023Updated 2 years ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- Quickly identify the ownership of hosts to identify scope during penetration tests☆13Jul 19, 2024Updated last year
- PowerShell module providing utility commands to manipulate a APK file on Windows☆15Apr 14, 2025Updated 11 months ago
- ☆42Jul 14, 2021Updated 4 years ago
- Deeply Embeddable bare-metal C++ standard library☆12Feb 16, 2025Updated last year
- A collection of headers containing useful tools and gadgets for building C++ programs☆11Feb 26, 2025Updated last year
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- JTAG debugging support for Allwinner SoCs☆10Mar 4, 2026Updated 2 weeks ago
- Ultra fast hashcracking tool written in Python3☆12Mar 28, 2021Updated 4 years ago
- Vulnerability Cheatsheet☆54Apr 22, 2022Updated 3 years ago
- 🎉 Happy 4th anniversary to the ResetHacker community! 🎉☆11Aug 8, 2024Updated last year
- ☆14Aug 25, 2022Updated 3 years ago
- tool to bypass 403/401 pages ( helpful for bug hunting)☆20May 7, 2023Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Jun 23, 2020Updated 5 years ago
- ☆14Mar 6, 2023Updated 3 years ago
- tp-link Decrypt/Crypt Config files☆15Oct 25, 2022Updated 3 years ago
- SLE 4442 smartcard emulation on an AVR☆14Apr 20, 2020Updated 5 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- HowToLogin is a tool that tests web application login pages for login page vulnerabilities and impelementations.☆21Mar 7, 2026Updated last week
- BurpSuite Extension for performing scan via CLI.☆14Dec 5, 2017Updated 8 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- CommandInWiFi: Exploiting SSID Storage in WiFi Scanning for Command Injection☆36Mar 9, 2026Updated last week
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16May 28, 2022Updated 3 years ago
- Unofficial mirror of GNUK's submodule: Chopstx☆15Feb 16, 2022Updated 4 years ago
- Solutions from @PortSwigger labs☆13Apr 11, 2024Updated last year
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- ☆17Sep 24, 2022Updated 3 years ago