X-Byt3's Projects
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), artificial intelligence, vulnerability research, exploit development, reverse engineering, and more.
๐ฐ Managing command snippets for hackers/bug bounty hunters. with pet.
Tutorials and Things to Do while Hunting Vulnerability.
HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets
Golang HTTP echo server (real raw request echoed)
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Asset inventory of over 800 public bug bounty programs.
The worldโs 1st book of very detailed iOS App reverse engineering skills :)
JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
my c++ notes
This repository is about @harshbothra_'s 365 days of Learning Tweets & Mindmaps collection.
Backup copy of [SnD] [lena151] Reversing With Lena (Tutorials)
a python tool for changing mac with great ui
A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.
๐๐ This is a ๐๐ฅ REAL WORLD๐ฅ ๐ Malware Collection I have Compiled & analysed by researchers๐ฅ to understand more about Malware threats๐, analysis and mitigation๐ง.
Collection of malware source code for a variety of platforms in an array of different programming languages.
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
An incredibly fast proxy checker & IP rotator with ease.
Offensive Security ~>
This repo contains C/C++ snippets that can be handy in specific offensive scenarios.
Bug Bounty Vps Setup Tools
A Workflow Engine for Offensive Security
Payload Arsenal for Pentration Tester and Bug Bounty Hunters
Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. Includes payloads, dorks, fuzzing materials, and offers in-depth theory sections. Visit our Medium profile for more information.
Simple command-line snippet manager, written in Go.