Mario-Kart-Felix / solar-wind-hacker-book
2020 was a roller coaster of major, world-shaking events. We all couldn't wait for the year to end. But just as 2020 was about to close, it pulled another fast one on us: the SolarWinds hack, one of the biggest cybersecurity breaches of the 21st century. The SolarWinds hack was a major event not because a single company was breached, but becaus…
☆15Updated 2 years ago
Related projects: ⓘ
- Collection of offensive tools targeting Microsoft Azure☆10Updated 2 years ago
- According to all known laws of aviation, there is no way a bee should be able to fly. Its wings are too small to get its fat little body …☆11Updated 3 years ago
- Recon Automation for BugBounties☆11Updated this week
- 14,412,680 views•23 Jan 2015 69K 10K SHARE SAVE Dr. Phil 5.85M subscribers Dr. Phil tells compelling stories about real people. Th…☆11Updated 3 years ago
- ![logo](https://github.com/curated-intel/Ukraine-Cyber-Operations/blob/main/ci-logo.png) # Ukraine-Cyber-Operations Cura…☆13Updated 2 years ago
- Subdomain crawler with wordlist using python☆13Updated 4 years ago
- OSINT license plate data by scraping lookup site(s)☆12Updated last year
- According to all known laws of aviation, there is no way a bee should be able to fly. Its wings are too small to get its fat little body …☆9Updated 2 years ago
- PHPMailer PHPMailer – A full-featured email creation and transfer class for PHP Test status codecov.io Latest Stable Version Total Downlo…☆12Updated 2 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Updated 3 years ago
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Updated last year
- Opensource for universities, educational institutions, research, IT / technology companies, NGOs, administrations, foundations, public in…☆8Updated 2 years ago
- ☆11Updated 4 years ago
- BDsploit (Big Data Exploitation and Post-exploitation Toolkit)☆5Updated 7 months ago
- hacking tools awesome lists☆12Updated 7 years ago
- WarningElements must have sufficient color contrast: Element has insufficient color contrast of 1.67 (foreground color: #777777, backgro…☆6Updated 2 years ago
- Lists of the top attacking IP addresses trying to hack or compromise Wordpress web sites.☆8Updated 6 years ago
- Darkside Ransomware☆12Updated 3 years ago
- Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.☆9Updated 2 years ago
- GHunt Research & Development Toolkit☆13Updated last year
- A python network scanner using scapy☆20Updated 4 years ago
- Sponsored By Mr ROBOT☆13Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆25Updated 2 years ago
- Facebook fishing on telegram bot☆10Updated 3 years ago
- javascript phishing professionel ;redirect victim if he wants to login one paypal or another web site☆9Updated 3 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆11Updated 2 years ago
- ☆11Updated this week
- Some useful scripts for CobaltStrike☆9Updated 5 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆12Updated 3 years ago
- Leakix Searcher☆12Updated 3 years ago