Dan-Duran / hak3rLinks
🚀 A modern, responsive portfolio template for cybersecurity professionals built with React, TypeScript, and Flowbite. Features include system-aware dark/light theme, SEO optimization, and clean component architecture.
☆27Updated 5 months ago
Alternatives and similar repositories for hak3r
Users that are interested in hak3r are comparing it to the libraries listed below
Sorting:
- An insane list of all dorks taken from everywhere from various different sources.☆710Updated 11 months ago
- Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing…☆360Updated last year
- Here Are Some Popular Hacking PDF☆518Updated last month
- Complete Roadmap for Penetration Testing☆244Updated last year
- tool used to change your IP every second your want☆404Updated last year
- Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers ou…☆488Updated last year
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆626Updated 2 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆541Updated 2 weeks ago
- A quick bug bounty guide for beginners☆85Updated 5 months ago
- A list of 350+ free TryHackMe rooms💻 to kick off your cybersecurity learning, organized by topics for easy exploration and practical ski…☆90Updated last week
- EthicalHacking, Python, Nmap, Metasploit☆187Updated 4 years ago
- ☆23Updated last month
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆33Updated 2 weeks ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆98Updated 2 years ago
- Shodan Dorks☆455Updated 7 months ago
- Omnisci3nt – See What They’ve Tried to Hide Extract deep intelligence from any domain. From subdomains to SSL certs, archived secrets to …☆300Updated last month
- Hello, aspiring hackers! 🕵️♂️ Here’s a list of 500+ Free TryHackMe rooms to kickstart your cybersecurity journey. These rooms are absol…☆205Updated last month
- Study notes for the Certified Ethical Hacker v12.☆134Updated last year
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆76Updated 6 months ago
- Elevate your cybersecurity profile with this streamlined portfolio template. Showcase exploits, projects, and skills succinctly. Perfect …☆17Updated last year
- This portfolio is suitable for the person who are interested in ethtical hacking. This project is created using HTML, CSS and JS. Easy to…☆44Updated last year
- Google Dork List - Uncover the Hidden Gems of the Internet ( There are at least 320+ categories ) + Web App☆569Updated 2 months ago
- It is a advanced keylogger.☆63Updated last year
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆73Updated last year
- a breakdown of the Certified Ethical Hacker (CEH v13) course modules along with their key objectives. These modules are structured to al…☆15Updated 2 months ago
- 100 Hacking Tools and Resources☆110Updated 2 years ago
- recon for bug hunters☆806Updated 3 weeks ago
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆12Updated 3 weeks ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆226Updated 4 months ago
- Personal notes from the eJPT course, for the eJPT exam.☆21Updated 2 years ago