AlexisAhmed / the-book-of-secret-knowledgeView external linksLinks
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
☆37Nov 3, 2019Updated 6 years ago
Alternatives and similar repositories for the-book-of-secret-knowledge
Users that are interested in the-book-of-secret-knowledge are comparing it to the libraries listed below
Sorting:
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆20Feb 15, 2020Updated 6 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆17Feb 20, 2020Updated 5 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆15Oct 28, 2018Updated 7 years ago
- A list of Free Software network services and web applications which can be hosted locally. Selfhosting is the process of hosting and mana…☆12Mar 29, 2020Updated 5 years ago
- 🙃 Reverse Shell Cheat Sheet 🙃☆13Mar 11, 2019Updated 6 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆15Sep 9, 2017Updated 8 years ago
- A list of resources for those interested in getting started in bug bounties☆16Jan 15, 2019Updated 7 years ago
- An evolving how-to guide for securing a Linux server.☆15Apr 12, 2019Updated 6 years ago
- Bug-Bounty Resources and Articles☆14Sep 16, 2018Updated 7 years ago
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆13Jul 19, 2019Updated 6 years ago
- Freely available programming books☆69Oct 3, 2018Updated 7 years ago
- A collection of resources, guides and automation scripts used to secure the Docker platform☆33May 5, 2024Updated last year
- Install LAMP(Linux + Apache + MySQL/MariaDB/Percona Server + PHP ) for CentOS/Fedora/Debian/Ubuntu☆10Apr 4, 2020Updated 5 years ago
- A collection of python scripts that are used for network analysis and testing.☆59Oct 4, 2019Updated 6 years ago
- A collection of shell scripts from the scripting series.☆46Mar 1, 2022Updated 3 years ago
- A Simple C Reverse Shell☆22Jan 9, 2019Updated 7 years ago
- A list of web application security☆80Oct 8, 2018Updated 7 years ago
- List of Awesome Red Teaming Resources☆117Jan 2, 2019Updated 7 years ago
- A collection of penetration testing tools written in Python 2☆14Sep 16, 2019Updated 6 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- Python YouTube Video Downloader☆16May 25, 2020Updated 5 years ago
- Hacker101☆47Aug 14, 2018Updated 7 years ago
- هذا المستودع هي محاولة منا لاثراء المحتوي العربي بخصوص البج بونتي ومايحتويه من انواع ثغرات الي تقنيات مختلفة الي مصادر متعددة☆38Apr 26, 2022Updated 3 years ago
- Top disclosed reports from HackerOne☆10Jun 9, 2020Updated 5 years ago
- Python3 Nmap Scanner☆110Feb 1, 2024Updated 2 years ago
- ☆26Feb 28, 2023Updated 2 years ago
- S3 Recon tips and tricks collected from different resources,Sorry if i missed to mention all resources owners☆27Nov 13, 2021Updated 4 years ago
- Security Advisories and Researches☆15Aug 19, 2014Updated 11 years ago
- ☆14Sep 27, 2023Updated 2 years ago
- 🎯 SQL Injection Payload List☆10Jun 6, 2021Updated 4 years ago
- A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.☆1,172Aug 16, 2023Updated 2 years ago
- ☆32Aug 12, 2021Updated 4 years ago
- Tools that i personally use for Bug Bounty Hunting and web assessments.☆294Jul 1, 2023Updated 2 years ago
- ☆29Dec 13, 2023Updated 2 years ago
- Collection of Wireshark resources & PCAP files used in the Blue Team training course☆71Mar 20, 2022Updated 3 years ago
- ☆15Nov 3, 2023Updated 2 years ago
- Nginx alias traversal vulnerable environments for study☆15May 8, 2020Updated 5 years ago
- a vulnerable GraphQL application☆20Dec 13, 2019Updated 6 years ago
- Security pentesting/devsecops/bug bounty/Cloud etc.☆20Feb 7, 2024Updated 2 years ago