Collection of the cheat sheets useful for pentesting
updated at May 4, 2024, 3:45 p.m.
🕵️ Tool to reverse-engineer Protocol Buffers with unknown definition
updated at May 4, 2024, 3:17 p.m.
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.
updated at May 4, 2024, 1:42 p.m.
A cross-version Python bytecode decompiler
updated at May 4, 2024, 12:22 p.m.
Automatic SQL injection and database takeover tool
updated at May 4, 2024, 12:20 p.m.
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
updated at May 4, 2024, 8:35 a.m.
A list of interesting payloads, tips and tricks for bug bounty hunters.
updated at May 4, 2024, 8:01 a.m.
Java decompiler, assembler, and disassembler
updated at May 4, 2024, 7:48 a.m.
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
updated at May 4, 2024, 6:06 a.m.
Capstone disassembly/disassembler framework for ARM, ARM64 (ARMv8), BPF, Ethereum VM, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, TriCore, Webassembly, XCore and X86.
updated at May 3, 2024, 2:04 p.m.