-
A Divinemonk creaction!
- | Stay Anonymous |
- https://divinemonk.github.io/
- @HrDivinemonk
- hrdivinemonk
- @hrdivinemonk
Highlights
Lists (7)
Sort Name ascending (A-Z)
Stars
A New Exploitation Technique for Visual Studio Projects
A cloudflare verification bypass script for webscraping
[Support 0.49.x](Reset Cursor AI MachineID & Bypass Higher Token Limit) Cursor Ai ,自动重置机器ID , 免费升级使用Pro功能: You've reached your trial request limit. / Too many free trial accounts used on this machi…
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Non-official write up for the Juice-Shop CTF
A privacy-first, self-hosted, fully open source personal knowledge management software, written in typescript and golang.
DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.
📺 Cross-platform IPTV player application with multiple features, such as support of m3u and m3u8 playlists, favorites, TV guide, TV archive/catchup and more.
RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Ethical Hacking. (For educational purposes only)
IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.
An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.
jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying sensitive data, such as API endpoints and potential security v…
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
Significant security enchancements of recent major Android versions.
A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where we scanned 20k+ public AMIs.
A collection of smart contract vulnerabilities along with prevention methods
Complete Roadmap for Penetration Testing
A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
A resource containing all the tools each ransomware gangs uses
A simple, easy to use PowerShell script to remove pre-installed apps, disable telemetry, as well as perform various other changes to customize, declutter and improve your Windows experience. Win11D…