Hacker101
☆46Aug 14, 2018Updated 7 years ago
Alternatives and similar repositories for hacker101
Users that are interested in hacker101 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WikiLeaks Vault 7 CIA Hacking Tools☆15Sep 9, 2017Updated 8 years ago
- A list of resources for those interested in getting started in bug bounties☆15Jan 15, 2019Updated 7 years ago
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆13Jul 19, 2019Updated 6 years ago
- Get files from Android directories☆11Dec 9, 2018Updated 7 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆14Oct 28, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆36Nov 3, 2019Updated 6 years ago
- 🙃 Reverse Shell Cheat Sheet 🙃☆13Mar 11, 2019Updated 7 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆17Feb 20, 2020Updated 6 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Bug-Bounty Resources and Articles☆13Sep 16, 2018Updated 7 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated 2 years ago
- List of Awesome Red Teaming Resources☆114Jan 2, 2019Updated 7 years ago
- simple script to pwn android phone with physical access☆26Dec 22, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆24Jul 19, 2019Updated 6 years ago
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆19Feb 15, 2020Updated 6 years ago
- A collection of python scripts that are used for network analysis and testing.☆57Oct 4, 2019Updated 6 years ago
- Freely available programming books☆67Oct 3, 2018Updated 7 years ago
- How to make a simple IMSI Catcher (Credit: Keld Norman)☆46Feb 24, 2018Updated 8 years ago
- Tool to execute BREACH attack.☆26Jul 27, 2018Updated 7 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆39Sep 30, 2018Updated 7 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Android NFC App to read and display the Track 2 information from a PayPass/PayWave card. using EMV library http://sourceforge.net/proje…☆24Mar 12, 2015Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Open Source Intelligence Tools, Writeups, Web Reconnaissance, Toolkits, Other Awesome Represotries and More☆15Apr 28, 2020Updated 5 years ago
- Search engine scraper tool with BASH script.☆83Jan 28, 2020Updated 6 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆112Oct 11, 2018Updated 7 years ago
- A collection of penetration testing tools written in Python 2☆14Sep 16, 2019Updated 6 years ago
- ☆20Jul 30, 2018Updated 7 years ago
- Basic tutorials for reverse engineer with radare2☆60Mar 17, 2019Updated 7 years ago
- Python YouTube Video Downloader☆16May 25, 2020Updated 5 years ago
- ADB Based Acquisition Tool for Android Forensics☆44Mar 30, 2021Updated 5 years ago
- Selective wifi jammer - control who can connect where☆48Sep 12, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- Zero-day vulnerabilities affecting Microsoft Exchange Server☆12Oct 4, 2022Updated 3 years ago
- ☆12Dec 30, 2020Updated 5 years ago
- Python Remote Administration Tool☆15Jan 8, 2017Updated 9 years ago
- A Simple C Reverse Shell☆22Jan 9, 2019Updated 7 years ago
- API pwndb☆89Mar 2, 2019Updated 7 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago