awesome-mobile-roboticsUseful links of different content related to AI, Computer Vision, and Robotics.
Stars: ✭ 243 (+81.34%)
books-ML-and-DL.pdf Format Books for Machine and Deep Learning
Stars: ✭ 105 (-21.64%)
Pybookspython books
Stars: ✭ 87 (-35.07%)
goLazagneGo library for credentials recovery
Stars: ✭ 177 (+32.09%)
3klconAutomation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.
Stars: ✭ 189 (+41.04%)
xecaPowerShell payload generator
Stars: ✭ 103 (-23.13%)
KnaryA simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams & Pushover support
Stars: ✭ 187 (+39.55%)
bug-bountyMy personal bug bounty toolkit.
Stars: ✭ 127 (-5.22%)
Awesome Shodan Queries🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
Stars: ✭ 2,758 (+1958.21%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+35.82%)
dproofreadersDistributed Proofreaders is a web application intended to ease the process of converting public domain books into e-texts.
Stars: ✭ 35 (-73.88%)
cummings.eeA collection of the work of Edward Estlin Cummings, as it enters the public domain.
Stars: ✭ 32 (-76.12%)
SSI Extra MaterialsIn my computer security courses I make extensive usage of cheatsheets for various tools and extra materials to complement the student learning if they are willing to do so. I have decided to share them to enable others to take advantage of them
Stars: ✭ 42 (-68.66%)
BestGifts for Programmers
Stars: ✭ 22 (-83.58%)
Remote Desktop CachingThis tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (+27.61%)
Intel-OneCommand line tool for passive reconnaissance, able to gather and link public information to a target domain, company or individual. It can make intelligence gathering faster and more effective by drastically reducing manual user interaction. This is achieved through the engineering of a highly customisable single input to multiple output solutio…
Stars: ✭ 23 (-82.84%)
Pe LinuxLinux Privilege Escalation Tool By WazeHell
Stars: ✭ 168 (+25.37%)
LibGenesisAn API workaround the library genesis platform to enable query search
Stars: ✭ 46 (-65.67%)
PacuThe AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Stars: ✭ 2,451 (+1729.1%)
a-physical-bookFor National Novel Generation Month 2017
Stars: ✭ 72 (-46.27%)
MinesweeperA Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (+20.9%)
Awesome-CyberSec-ResourcesAn awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (+103.73%)
domhttpxdomhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time.
Stars: ✭ 59 (-55.97%)
PhpvulnAudit tool to find common vulnerabilities in PHP source code
Stars: ✭ 146 (+8.96%)
FuseA penetration testing tool for finding file upload bugs (NDSS 2020)
Stars: ✭ 147 (+9.7%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+348.51%)
Print My ShellPython script wrote to automate the process of generating various reverse shells.
Stars: ✭ 140 (+4.48%)
SilentbridgeSilentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.
Stars: ✭ 136 (+1.49%)
STEWSA Security Tool for Enumerating WebSockets
Stars: ✭ 154 (+14.93%)
ReconnoitreA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+1261.19%)
NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+1338.81%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-82.84%)
Awesome VulnerableA curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
Stars: ✭ 133 (-0.75%)
FeatureflagsThe guide to decoupling feature rollout from code deployment for feature flag-driven development. Feature flags give a software organization the power to reduce risk, iterate quicker, and get more control.
Stars: ✭ 231 (+72.39%)
Buffer overflowDon't let buffer overflows overflow your mind
Stars: ✭ 131 (-2.24%)
CamRaptorCamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.
Stars: ✭ 106 (-20.9%)
Book NotesNotes from books and other interesting things that I've read. Table of contents at the end 👇
Stars: ✭ 2,636 (+1867.16%)
JwtxploiterA tool to test security of json web token
Stars: ✭ 130 (-2.99%)
urldedupePass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
Stars: ✭ 208 (+55.22%)
DictionaryDictionary of Ukrainian counterparts for technical terms
Stars: ✭ 79 (-41.04%)
pentesting-notesNotes from OSCP, CTF, security adventures, etc...
Stars: ✭ 38 (-71.64%)
DNSExplorerBash script that automates the enumeration of domains and DNS servers in the active information gathering.
Stars: ✭ 33 (-75.37%)
Personal GoalsList of books I've read, projects I've done, videos I've seen, articles I've read or podcasts I've listened to.
Stars: ✭ 75 (-44.03%)
F2edocs.com📘 前端开发-学习资料库 (开源书籍,规范,博客社区,面试题)。前端开发者,是这个互联网时代不可缺少的角色,我们彼此相爱,我们共同学习。
Stars: ✭ 74 (-44.78%)
Philosophy A list of philosophy books and resources.
Stars: ✭ 206 (+53.73%)
rsmReverse shell manager using tmux and ncat
Stars: ✭ 29 (-78.36%)