Dan-Duran / hak3rLinks
π A modern, responsive portfolio template for cybersecurity professionals built with React, TypeScript, and Flowbite. Features include system-aware dark/light theme, SEO optimization, and clean component architecture.
β26Updated 4 months ago
Alternatives and similar repositories for hak3r
Users that are interested in hak3r are comparing it to the libraries listed below
Sorting:
- An insane list of all dorks taken from everywhere from various different sources.β701Updated 10 months ago
- Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers ouβ¦β479Updated last year
- Complete Roadmap for Penetration Testingβ242Updated last year
- tool used to change your IP every second your wantβ400Updated last year
- β10Updated 4 months ago
- A quick bug bounty guide for beginnersβ83Updated 4 months ago
- Shodan Dorksβ446Updated 7 months ago
- Here Are Some Popular Hacking PDFβ512Updated 3 weeks ago
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.β580Updated 2 months ago
- Omnisci3nt β See What Theyβve Tried to Hide Extract deep intelligence from any domain. From subdomains to SSL certs, archived secrets to β¦β298Updated last month
- Here you can find mostly all disclosed h1 reportsβ27Updated 3 years ago
- Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditingβ¦β347Updated last year
- Google Dork List - Uncover the Hidden Gems of the Internet ( There are at least 320+ categories ) + Web Appβ568Updated last month
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.β538Updated this week
- 100 days of cybersecurity - join Discord and connect with us to know more on this challenge #100daysofcybersecurity #sector21β190Updated 5 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.β97Updated 2 years ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.β211Updated 4 months ago
- Study notes for the Certified Ethical Hacker v12.β132Updated last year
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity taβ¦β33Updated last week
- 100 Hacking Tools and Resourcesβ111Updated 2 years ago
- recon for bug huntersβ795Updated 3 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.β237Updated 8 months ago
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability dβ¦β75Updated 6 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs β¦β254Updated 5 months ago
- β23Updated 3 weeks ago
- Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, β¦β59Updated 2 years ago
- Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.β660Updated last week
- β439Updated 2 months ago
- Penetration Testing For - Web | Mobile | API | Thick Client | Source Code Review | DevSecOps | Wireless | Network Pentesting, etc...β1,313Updated 3 weeks ago
- how to look for Leaked Credentials !β984Updated last year