Hacker101
☆46Aug 14, 2018Updated 7 years ago
Alternatives and similar repositories for hacker101
Users that are interested in hacker101 are comparing it to the libraries listed below
Sorting:
- WikiLeaks Vault 7 CIA Hacking Tools☆15Sep 9, 2017Updated 8 years ago
- A list of resources for those interested in getting started in bug bounties☆15Jan 15, 2019Updated 7 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆13Jul 19, 2019Updated 6 years ago
- Get files from Android directories☆11Dec 9, 2018Updated 7 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆37Nov 3, 2019Updated 6 years ago
- Bug-Bounty Resources and Articles☆13Sep 16, 2018Updated 7 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆17Feb 20, 2020Updated 6 years ago
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆19Feb 15, 2020Updated 6 years ago
- Tools that i personally use for Bug Bounty Hunting and web assessments.☆293Jul 1, 2023Updated 2 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated last year
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆24Jul 19, 2019Updated 6 years ago
- remote control an android phone via ADB☆10Nov 17, 2015Updated 10 years ago
- An evolving how-to guide for securing a Linux server.☆15Apr 12, 2019Updated 6 years ago
- Freely available programming books☆69Oct 3, 2018Updated 7 years ago
- simple script to pwn android phone with physical access☆27Dec 22, 2018Updated 7 years ago
- Cert Michelin Awareness Card Game repository☆15Dec 10, 2017Updated 8 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- List of Awesome Red Teaming Resources☆115Jan 2, 2019Updated 7 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- ☆13Dec 12, 2021Updated 4 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- A list of web application security☆79Oct 8, 2018Updated 7 years ago
- openvpn server configs☆14May 12, 2016Updated 9 years ago
- A collection of penetration testing tools written in Python 2☆14Sep 16, 2019Updated 6 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- openVAS with ansible☆21Apr 22, 2015Updated 10 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆39Sep 30, 2018Updated 7 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- ☆20Jul 30, 2018Updated 7 years ago
- Python YouTube Video Downloader☆16May 25, 2020Updated 5 years ago
- How to make a simple IMSI Catcher (Credit: Keld Norman)☆46Feb 24, 2018Updated 8 years ago
- Basic tutorials for reverse engineer with radare2☆60Mar 17, 2019Updated 6 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Search engine scraper tool with BASH script.☆83Jan 28, 2020Updated 6 years ago
- site source jivoi.github.io☆22Nov 7, 2022Updated 3 years ago