📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
☆26Jun 16, 2021Updated 4 years ago
Alternatives and similar repositories for hacker_roadmap
Users that are interested in hacker_roadmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)☆20Nov 10, 2024Updated last year
- RabbitMQ exploit and Pentesting guide for penetration tester☆20Nov 22, 2023Updated 2 years ago
- Mass report tool for social media platform Snapchat☆13Mar 14, 2023Updated 3 years ago
- Scrape files for sensitive information, and generate an interactive HTML report. Based on Rabin2.☆17Feb 25, 2026Updated last month
- xss vulnerability scanner and input fuzzing tool.☆59Apr 8, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- File watcher for TypeScript projects☆13May 29, 2025Updated 9 months ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 3 years ago
- A tool to generate wordlists based on case☆30Nov 24, 2025Updated 4 months ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- InstaNinja is your all-in-one Instagram tool designed to manage multiple accounts seamlessly. With a user-friendly GUI, InstaNinja allows…☆10Dec 30, 2024Updated last year
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆31Nov 10, 2024Updated last year
- Custom mini tools during Red Teaming engagements☆24Mar 7, 2026Updated 2 weeks ago
- Automated Web Recon Shell Scripts☆53Dec 6, 2021Updated 4 years ago
- ALL IN ONE Hacking Tool For Hackers☆10Jun 2, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- OSINT tools can be used for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team operations and…☆14Jul 2, 2024Updated last year
- ☆53Aug 27, 2020Updated 5 years ago
- Keeps track of what repos needs to be saved from the new Github " Exploits and malware policy"☆23May 15, 2021Updated 4 years ago
- A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate alternative IP(v4) address representati…☆92Aug 25, 2023Updated 2 years ago
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 6 years ago
- ☆40Jun 5, 2021Updated 4 years ago
- SCIENCE, HACKING AND SECURITY☆13May 23, 2022Updated 3 years ago
- Script will enumerate domain name using horizontal enumeration, reverse lookup. Each horziontal domain will then be vertically enumerated…☆31Aug 2, 2019Updated 6 years ago
- Python Script to Print the name of the companies that are acquired by a Target Company and the Time of Acquisition.☆26Dec 5, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Adonis 5 BullMQ provider☆16May 18, 2023Updated 2 years ago
- Powerful tool that guesses the email of aged accounts via the "password reset" option at Instagram. This allows you to find the potential …☆13Aug 1, 2021Updated 4 years ago
- Listing of books that may be useful for a software tester☆30Oct 17, 2014Updated 11 years ago
- This bot will allow you to termed ANY Discord Server/Account Within Seconds!☆14Sep 4, 2021Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Execute commands across Windows and Linux systems using multiple RCE methods☆86Mar 2, 2026Updated 3 weeks ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Ultimate Cybersecurity Roadmap (2025 Edition) | Beginner to Advanced Guide | Learn Ethical Hacking, SOC Analysis, Threat Hunting, Inciden…☆33Jul 7, 2025Updated 8 months ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 8 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- Reconstruction of the Linux kernel history with correct dates; see https://github.com/dspinellis/linux-history-make☆13Aug 23, 2018Updated 7 years ago
- Trigger-only for CVE-2021-29627☆13Apr 12, 2021Updated 4 years ago