0xcyberpj's Stars
lencx/ChatGPT
🔮 ChatGPT Desktop Application (Mac, Windows and Linux)
michalsnik/aos
Animate on scroll library
Ciphey/Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
qazbnm456/awesome-web-security
🐶 A curated list of Web Security materials and resources.
djadmin/awesome-bug-bounty
A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.
KingOfBugbounty/KingOfBugBountyTips
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..
epinna/tplmap
Server-Side Template Injection and Code Injection Detection and Exploitation Tool
reddelexc/hackerone-reports
Top disclosed reports from HackerOne
JohnHammond/msdt-follina
Codebase to generate an msdt-follina payload
m0nad/awesome-privilege-escalation
A curated list of awesome privilege escalation
BuffaloWill/oxml_xxe
A tool for embedding XXE/XML exploits into different filetypes
Py-Contributors/awesomeScripts
A Collection of Awesome Scripts in Python to Ease Daily-Life. Create an issue If you have some great ideas for the new script. Leave a :star:
abdulkadir-gungor/JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
EONRaider/100-redteam-projects
A small list of projects for students of programming for cybersecurity
securebinary/firebaseExploiter
FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built for mass hunting bug bounties and for penetration testing.
karanS08/ctf-tools
Add links to your favorite CTF tools to make other people lives easier .
securebinary/o365sprayer
An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.
techyminati/python_codes
This is a beginner friendly , repository made for python codes, specifically for Hacktoberfest event
c0brabaghdad1/DVPA
Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges
Romi904/Durmello
Developer Roadmap22, Contribute Genuine Contribution/Project, Don't Copy Paste Other Code, If Your Contribution is good then You Will be labelled.Happy Coding 🌟
0xabdulkhalid/basket-sign-up
Beautifully crafted Signup form with securable Form validation..🚀
SR-Sunny-Raj/Hacktoberfest2022-EXCLUDED
This repository has been EXCLUDED from Hacktoberfest. Request you to make your contribution in this repository -> https://github.com/SR-Sunny-Raj/Hacktoberfest2022-for-everyone
0xcyberpj/c0vertX
c0vertX - The Art of Hiding Messages in Plain Sight
jopraveen/pwnkiller
0xabdulkhalid/product-preview-card-component
An exercise/assessment which was submitted with additional features and tweaks that aspires everyone..✨
jontay999/binary-exploitation
PinkDraconian/SpotTheVulnerability
0xcyberpj/odin-code
0xcyberpj/CRTP-Notes
Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing
UVvirus/smart-contracts