Loading contributions...
Top Repositories
A simple python script that goes through a wordlist to decrypt an MD5 hash.
One of the oldest forms of cyber threat, keyloggers record keystrokes typed in the keyboard and send them to a third party.
This is just a simple python script to identify some of the common ports you may come across during enumeration or in daily network activities.
Compilation of resources and notes from TCM's Practical Ethical Hacking Course
Captain
Sliver CheatSheet for OSEP
Repositories
21One of the oldest forms of cyber threat, keyloggers record keystrokes typed in the keyboard and send them to a third party.
Sliver CheatSheet for OSEP
eLearnSecurity Junior Penetration Tester (eJPT) v2 Notes
My blog site.
Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB extraction) for bitmap images.
Compilation of resources and notes from TCM's Practical Ethical Hacking Course
Blog posts for our CTF bustles.
Captain
Learning some php.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
You can find the shield website here https://th3-shield.github.io/the_shield/ OR
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
A multiplatform IOC hunter for Cyber Threat Intelligence
A simple python script that goes through a wordlist to decrypt an MD5 hash.
No description provided.
Here we are going to practice pull request by adding our name plus GitHub link to the readme file
A collaboration for a campus (school) management system.
Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.
A to do list app With User Authentication.
A repo for the fr334aks-TTW members to challenge
This is just a simple python script to identify some of the common ports you may come across during enumeration or in daily network activities.