Hacker101
☆46Aug 14, 2018Updated 7 years ago
Alternatives and similar repositories for hacker101
Users that are interested in hacker101 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WikiLeaks Vault 7 CIA Hacking Tools☆15Sep 9, 2017Updated 8 years ago
- A list of resources for those interested in getting started in bug bounties☆15Jan 15, 2019Updated 7 years ago
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆13Jul 19, 2019Updated 6 years ago
- Get files from Android directories☆11Dec 9, 2018Updated 7 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆37Nov 3, 2019Updated 6 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆17Feb 20, 2020Updated 6 years ago
- Bug-Bounty Resources and Articles☆13Sep 16, 2018Updated 7 years ago
- List of Awesome Red Teaming Resources☆115Jan 2, 2019Updated 7 years ago
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆17Feb 15, 2020Updated 6 years ago
- A collection of python scripts that are used for network analysis and testing.☆57Oct 4, 2019Updated 6 years ago
- Tools that i personally use for Bug Bounty Hunting and web assessments.☆295Jul 1, 2023Updated 2 years ago
- Freely available programming books☆68Oct 3, 2018Updated 7 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Aug 25, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Tool to execute BREACH attack.☆26Jul 27, 2018Updated 7 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆39Sep 30, 2018Updated 7 years ago
- Open Source Intelligence Tools, Writeups, Web Reconnaissance, Toolkits, Other Awesome Represotries and More☆15Apr 28, 2020Updated 6 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆112Oct 11, 2018Updated 7 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- ☆20Jul 30, 2018Updated 7 years ago
- Basic tutorials for reverse engineer with radare2☆60Mar 17, 2019Updated 7 years ago
- Python YouTube Video Downloader☆16May 25, 2020Updated 5 years ago
- Go bindings for Carina™☆13Feb 6, 2017Updated 9 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ADB Based Acquisition Tool for Android Forensics☆45Mar 30, 2021Updated 5 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Dec 10, 2022Updated 3 years ago
- Algorithms of facial recognition through sketches☆13May 9, 2014Updated 11 years ago
- pure python remote adb scanner + nmap scan module☆22Dec 7, 2018Updated 7 years ago
- ☆12Dec 30, 2020Updated 5 years ago
- Modulo's Open Distributed SCAP Infrastructure Collector, or modSIC, makes it easier for security analysts to scan an environment vulnerab…☆15Jun 23, 2017Updated 8 years ago
- API pwndb☆88Mar 2, 2019Updated 7 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- ☆12May 4, 2021Updated 5 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- This is the code for "Build a Cybersecurity Startup" by Siraj Raval on Youtube☆92Dec 10, 2022Updated 3 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- Scan Victim Backup Directories & Backup Files☆183Sep 25, 2023Updated 2 years ago
- ☆12Jul 16, 2021Updated 4 years ago