xenoxavier's Stars
tclahr/uac
UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
jon-brandy/hackthebox
My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.
Az0x7/vulnerability-Checklist
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
makeitjustin/python-auto-bid-sniper-for-ebay-
Python script I wrote for biding for me , I always lose track of time and forget to bid so this help me out. hope you injoy
ChrisM-X/PortSwigger-Academy-CheatSheets
This repository contains cheatsheets and payloads compiled from completing the labs at PortSwigger Academy.
xenoxavier/Loki
Loki - Simple IOC and YARA Scanner
InQuest/awesome-yara
A curated list of awesome YARA rules, tools, and people.
public-apis/public-apis
A collective list of free APIs
cloudcommunity/Free-Certifications
A curated list of free courses & certifications.
jonaslejon/malicious-pdf
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
Astrosp/Awesome-OSINT-For-Everything
OSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.
google/google-ctf
Google CTF
NationalSecurityAgency/ghidra
Ghidra is a software reverse engineering (SRE) framework
daffainfo/AllAboutBugBounty
All about bug bounty (bypasses, payloads, and etc)
ally-petitt/OSCP-cheatsheet
These are some of the notes that I created on my OSCP journey. I hope that you learn something new from them
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
marcsamuel/marcsamuel
C0MPL3XDEV/Hacking-Security-Ebooks
Top 100 Hacking & Security E-Books (Free Download)
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
xtekky/gpt4free
The official gpt4free repository | various collection of powerful language models
CyberSecurityUP/Python-for-Security
MalTrakLab/purple-team-cloud-lab
Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them
GearZer0/HakiChecker
Check reputation of IP/url/hash/file in bulk with mutiple OSINT
projectdiscovery/subfinder
Fast passive subdomain enumeration tool.
hasanfirnas/symbiote
Your target's phone's front and back cameras📸 can be accessed by sending a link🔗.
wssheldon/osintui
OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys
Ignitetechnologies/BurpSuite-For-Pentester
This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 solely and completely with "BurpSuite".
anse-app/chatgpt-demo
Minimal web UI for ChatGPT.
lencx/nofwl
NoFWL Desktop Application
lencx/ChatGPT
🔮 ChatGPT Desktop Application (Mac, Windows and Linux)