Lifka / hacking-resources
Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
☆2,025Updated 9 months ago
Alternatives and similar repositories for hacking-resources:
Users that are interested in hacking-resources are comparing it to the libraries listed below
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆3,987Updated 3 weeks ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆2,971Updated 2 weeks ago
- Collections of tools and methods created to aid in OSINT collection☆2,967Updated last year
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,436Updated 6 months ago
- Offensive Software Exploitation Course☆2,358Updated last year
- Awesome-Cellular-Hacking☆3,123Updated 4 months ago
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆1,779Updated last year
- Complete Listing and Usage of Tools used for Ethical Hacking☆1,650Updated last year
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆1,846Updated 3 years ago
- A collection of hacking tools, resources and references to practice ethical hacking.☆13,922Updated last year
- Reverse Engineer's Toolkit☆4,906Updated 11 months ago
- ⭐️ A curated list of awesome forensic analysis tools and resources☆4,212Updated 3 weeks ago
- A list of free and open forensics analysis tools and other resources☆1,223Updated 4 months ago
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,152Updated last year
- The all-in-one browser extension for offensive security professionals 🛠☆6,013Updated 2 months ago
- 🕵️ OSINT Tools for gathering information and actions forensics 🕵️☆1,888Updated 2 weeks ago
- Collection of methodology and test case for various web vulnerabilities.☆6,314Updated last week
- articles☆13,110Updated last year
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆4,406Updated 2 months ago
- BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial …☆1,327Updated 4 years ago
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,223Updated last year
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆2,076Updated 3 months ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,779Updated last year
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆16,627Updated 4 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,398Updated 6 months ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆1,552Updated 3 weeks ago
- List of Github repositories and articles with list of dorks for different search engines☆2,237Updated last month
- This is meant to assist people looking for entry level Cybersecurity jobs, as well as study up on skills that they can put on their resum…☆930Updated last year
- Awesome hacking is an awesome collection of hacking tools.☆3,230Updated 8 months ago
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆5,040Updated 3 months ago