Dan-Duran / hak3rLinks
๐ A modern, responsive portfolio template for cybersecurity professionals built with React, TypeScript, and Flowbite. Features include system-aware dark/light theme, SEO optimization, and clean component architecture.
โ22Updated last month
Alternatives and similar repositories for hak3r
Users that are interested in hak3r are comparing it to the libraries listed below
Sorting:
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity taโฆโ31Updated this week
- My notes while studying for the PNPT from TCM Security.โ76Updated last year
- 100 Hacking Tools and Resourcesโ108Updated 2 years ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.โ215Updated 6 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.โ95Updated last year
- Elevate your cybersecurity profile with this streamlined portfolio template. Showcase exploits, projects, and skills succinctly. Perfect โฆโ14Updated last year
- capNcook - a dark web exploration toolโ102Updated 8 months ago
- High quality and text versions of cheat sheets from Cyber Detective Twitterโ25Updated last year
- OSINTk.o is a customized Kali Linux-based ISO image with pre-installed packages and scriptsโ277Updated last year
- โ20Updated last month
- capNcook - a dark web exploration toolโ71Updated last year
- A quick bug bounty guide for beginnersโ77Updated last month
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability dโฆโ72Updated 3 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs โฆโ251Updated 2 months ago
- PIP-INTEL is an OSINT (Open Source Intelligence) tool designed using various open-source tools and pip packages.โ158Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating systeโฆโ170Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offeโฆโ139Updated 3 months ago
- This portfolio is suitable for the person who are interested in ethtical hacking. This project is created using HTML, CSS and JS. Easy toโฆโ33Updated 10 months ago
- CEH Practicalโ53Updated last year
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.โ14Updated 3 months ago
- Vector-Rat is a powerful remote access tool designed specifically for Windows. It allows seamless control and management of any device reโฆโ16Updated 2 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making iโฆโ104Updated last week
- ๐๐ผ๐บ๐ฝ๐น๐ฒ๐๐ฒ ๐๐๐ด ๐๐ผ๐๐ป๐๐ ๐ฅ๐ผ๐ฎ๐ฑ๐บ๐ฎ๐ฝ ๐ฏโ84Updated 4 months ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresseโฆโ237Updated last month
- Here you can find mostly all disclosed h1 reportsโ25Updated 3 years ago
- Omnisci3nt โ See What Theyโve Tried to Hide Extract deep intelligence from any domain. From subdomains to SSL certs, archived secrets to โฆโ263Updated 2 months ago
- Redirect All Traffic Through Tor Network For Kali Linuxโ191Updated 3 months ago
- Bash For Ethical Hackingโ63Updated 2 years ago
- Obtain a Phone Number full profile including HLR, Reputation, Carrier, Social Media Accounts, Geolocation, Validation, Availabilty, Portaโฆโ247Updated last year
- Passlord is a smart tool that creates lists of possible passwords using clever methods.โ25Updated 3 weeks ago