Lists (1)
Sort Name ascending (A-Z)
Stars
a rep for documenting my study, may be from 0 to 0.1
Xray, Penetrates Everything. Also the best v2ray-core. Where the magic happens. An open platform for various uses.
Elasticsearch 可视化DashBoard, 支持Es监控、实时搜索,Index template快捷替换修改,索引列表信息查看, SQL converts to DSL等
一款高性能 HTTP 代理隧道工具 | A high-performance http proxy tunneling tool
这款工具是一款功能强大的网络安全综合工具,旨在为安全从业者、红蓝对抗人员和网络安全爱好者提供全面的网络安全解决方案。它集成了多种实用功能,包括解密、分析、扫描、溯源等,为用户提供了便捷的操作界面和丰富的功能选择。This tool offers robust network security solutions for professionals and enthusiasts. With …
Adversary simulation and Red teaming platform with AI
Depix is a PoC for a technique to recover plaintext from pixelized screenshots.
Ethernaut Challenges Solutions with Foundry - By JohnnyTime
🍪 Flask Session Cookie Decoder/Encoder
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Linux privilege escalation auditing tool
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
This tool generates gopher link for exploiting SSRF and gaining RCE in various servers
Fair-code workflow automation platform with native AI capabilities. Combine visual building with custom code, self-host or cloud, 400+ integrations.
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
🌈 A simple and light theme for Hexo. It makes you more focused on writing.