LuisaRestrepo / MisionTIC2022-Ciclo1View external linksLinks
☆25Jun 30, 2021Updated 4 years ago
Alternatives and similar repositories for MisionTIC2022-Ciclo1
Users that are interested in MisionTIC2022-Ciclo1 are comparing it to the libraries listed below
Sorting:
- Troubleshooting bash script for the TryHackMe OpenVPN connection pack☆117Dec 8, 2025Updated 2 months ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆241Nov 4, 2020Updated 5 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆277Jan 14, 2023Updated 3 years ago
- Bag of really useful geoscience equations and stuff☆301Dec 19, 2023Updated 2 years ago
- Multi-threaded Python Port Scanner with Nmap Integration☆386Sep 4, 2022Updated 3 years ago
- A guide on how to become an Information (or Cyber) Security Professional. With resources from free to expensive.☆600Jan 2, 2023Updated 3 years ago
- Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the t…☆765Mar 11, 2022Updated 3 years ago
- This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machine…☆857Oct 23, 2022Updated 3 years ago
- The essential toolkit for reversing, malware analysis, and cracking☆970Jun 9, 2025Updated 8 months ago
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆914Aug 30, 2023Updated 2 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆969Nov 27, 2023Updated 2 years ago
- In this repository you will find sample code files for each day of the course "Python for OSINT. A 21-day course for beginners".☆1,081Jan 6, 2026Updated last month
- ☆1,071May 18, 2024Updated last year
- A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.☆1,172Aug 16, 2023Updated 2 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,463Mar 27, 2025Updated 10 months ago
- A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting☆1,749Sep 29, 2025Updated 4 months ago
- ☆1,456Jan 23, 2024Updated 2 years ago
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used ag…☆1,634Aug 29, 2025Updated 5 months ago
- A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for id…☆1,767Sep 11, 2025Updated 5 months ago
- A big list of Android Hackerone disclosed reports and other resources.☆1,665Sep 10, 2025Updated 5 months ago
- A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.☆1,808Jun 28, 2022Updated 3 years ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,967May 20, 2025Updated 8 months ago
- awesome-linux-rootkits☆2,023Updated this week
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!☆2,240Mar 7, 2024Updated last year
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of…☆2,222Jun 7, 2023Updated 2 years ago
- ☆2,200Sep 20, 2023Updated 2 years ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,389Feb 24, 2023Updated 2 years ago
- A list of Reverse Engineering articles, books, and papers☆2,637May 2, 2023Updated 2 years ago
- ☆2,907Feb 8, 2026Updated last week
- Create randomly insecure VMs☆2,746Feb 8, 2026Updated last week
- 😎 🔗 Awesome list about all kinds of resources for learning Ethical Hacking and Penetration Testing.☆3,314Dec 15, 2024Updated last year
- Find leaked secrets via github search☆3,133Oct 5, 2025Updated 4 months ago
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,141May 13, 2023Updated 2 years ago
- React Native wrapper for the Android ViewPager and iOS UIPageViewController.☆3,266Jan 9, 2026Updated last month
- Training and serving large-scale neural networks with auto parallelization.☆3,180Dec 9, 2023Updated 2 years ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,475Updated this week
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,639Updated this week
- General technology for enabling AI capabilities w/ LLMs and MLLMs☆4,284Dec 22, 2025Updated last month
- Collection of the cheat sheets useful for pentesting☆4,254Feb 16, 2024Updated 2 years ago