- Poland, Warsaw
- in/alganmuhammet
- @muhammetalgan5362
Lists (1)
Sort Name ascending (A-Z)
Stars
Created by the one and only M.M.
Study guide for the SC-900: Microsoft Security, Compliance, and Identity
CVE-2019-1388 Abuse UAC Windows Certificate Dialog
Privilege Escalation Enumeration Script for Windows
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
This Python script is a keylogger application that records keystrokes pressed on the keyboard and keeps track of statistics. Below you can find information about usage steps and features of the scr…
The Password Strength Checker program assigns a score for each criterion and uses the total score to assess the password's security. If the password receives a score of 5 out of 5, it is considered…
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
Linux enumeration tool for pentesting and CTFs with verbosity levels
Linux privilege escalation auditing tool
Scripted Local Linux Enumeration & Privilege Escalation Checks
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Simple php reverse shell implemented using binary .
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Learn-Hexadecimal is a simple Java application designed to help users improve their memory and familiarity with hexadecimal numbers. The purpose of this project is to provide an interactive and edu…
This Python program provides an interface to perform Caesar Encryption and Decryption operations. The user inputs text and sets a shift value, then encrypts or decrypts the text.
Interactive roadmaps, guides and other educational content to help developers grow in their careers.
webfs 1.21 copy dl: https://www.kraxel.org/releases/webfs/webfs-1.21.tar.gz // https://twitter.com/search?q=%40___winston%20webfs
An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!
Fast subdomains enumeration tool for penetration testers
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Red Teaming Tactics and Techniques
SubSeven Legacy Official Source Code Repository
Interactive LLM Powered NPCs, is an open-source project that completely transforms your interaction with non-player characters (NPCs) in any game! 🎮🤖🚀