- yoursite.com/index.app?url=gopher://pwnt
- https://app.hackthebox.com/profile/145473
Lists (2)
Sort
Name ascending (A-Z)
<
8000
/summary>
Starred repositories
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedowns and other DNS modifications.
A collection of free MIDI chords and progressions ready to be used in your DAW, Akai MPC, or Roland MC-707/101
A fast, feature-rich and reliable note-taking system for Orgmode/Emacs. Just files, no database.
A tool for visualizing ActivityPub traffic of a Mastodon instance
sharplispers / lparallel
Forked from lmj/lparallelParallelism for Common Lisp
Visualize BBOT scans in realtime with VivaGraphJS
Node graphs, OSINT data mining, and plugins. Connect unstructured and public data for transformative insights. The rewrite can be found @ osintbuddy/osintbuddy
This repository updates latest Bug Bounty medium writeups every 10 minutes, https://readmedium.com/Medium_URL, https://archive.ph/Medium_URL, https://freedium.cfd/Medium_URL
Nix language server, based on nix libraries [maintainer=@inclyc,@Aleksanaa]
Sento - Actor framework featuring actors and agents for easy access to state and asynchronous operations.
A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.
Unauthenticated Remote Code Execution – Bricks <= 1.9.6
A curated list of awesome serverless security resources such as (e)books, articles, whitepapers, blogs and research papers.
Wordlists that have been compiled using Commonspeak2. This repo is updated every time new wordlists are generated.
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
Common Lisp Koans is a language learning exercise in the same vein as the ruby koans, python koans and others. It is a port of the prior koans with some modifications to highlight lisp-specific fea…
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…