AlexisAhmed / hacker101Links
Hacker101
☆47Updated 6 years ago
Alternatives and similar repositories for hacker101
Users that are interested in hacker101 are comparing it to the libraries listed below
Sorting:
- A shell script that automatically performs a series of *NIX enumeration tasks.☆40Updated 4 years ago
- Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.☆60Updated 4 years ago
- Penetration Testing Playbook (PTP)☆174Updated 6 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆57Updated 7 years ago
- Python 3 For Offensive PenTest: A Complete Practical Course, published by Packt☆40Updated 2 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- XSS explot kit/Blind XSS framework/BurpSuite extension☆49Updated 5 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆75Updated 5 years ago
- VPN pentest tools and scripts☆126Updated 8 years ago
- A list of checks with tips for analyzing the security of Android applications☆12Updated 5 years ago
- AWS S3 Bucket/Object Finder☆120Updated 3 years ago
- The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/The…☆35Updated 5 years ago
- Bundle of wordlists for brute-forcing subdomains (World + RUSSIA based).☆67Updated 7 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆84Updated 7 years ago
- A place to store my own wordlists, and link to others that are useful☆108Updated last year
- Does some google dorks against a domain☆166Updated 5 years ago
- This reconissance tool is specific written for OSCP engagements.☆56Updated 2 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago
- How to prepare for OSCP complete guide☆129Updated 5 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆91Updated 4 years ago
- A simple Cherry Tree template that can be used to organize bug bounties☆37Updated 5 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆163Updated 5 years ago
- ☆47Updated 5 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- Penetration Testing/Security Cheatsheets☆61Updated 9 years ago
- SQLMap Cheatsheet v1.0 for sqlmap 1.0-dev-a72d738☆75Updated 11 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆78Updated 6 years ago
- Penetration Testing/Security Cheatsheets☆181Updated 6 years ago
- Repo of useful scripts☆104Updated 4 years ago