NetW0rK1le3r / awesome-hacking-listsLinks
☆87Updated 4 years ago
Alternatives and similar repositories for awesome-hacking-lists
Users that are interested in awesome-hacking-lists are comparing it to the libraries listed below
Sorting:
- Trends Website (URL) from Twitter hackers.☆105Updated this week
- Windows offline filesystem hacking tool for Linux☆96Updated 3 years ago
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆16Updated 4 years ago
- Offensive security use cases of ChatGPT☆75Updated 2 years ago
- Open source self-hosted cyber security learning platform☆53Updated 3 years ago
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆98Updated 2 years ago
- Notes, red team materials, testing tools, etc.☆145Updated last year
- CVE-2024-52940 - A zero-day vulnerability in AnyDesk's "Allow Direct Connections" feature, discovered and registered by Ebrahim Shafiei (…☆35Updated 11 months ago
- Memory Scaner☆63Updated 3 years ago
- A Linux persistence tool!☆159Updated last month
- D3Ext's Forward Shell☆120Updated 2 years ago
- ☆53Updated 5 years ago
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆71Updated 8 months ago
- 🐳 VMs are bloat. Dockerise your VAPT environment☆79Updated 6 months ago
- All Security Resource Collections Repos That I Published.☆126Updated 5 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- Meticulously curated security notes with Emphasis on Application Security, DevSecOps, Cloud Computing, and Penetration Testing.☆136Updated last year
- Windows And Ways To Break It☆98Updated 2 years ago
- Uses python3.10, Debian, python-Nmap, OpenaAI, and flask framework to create a Nmap API that can do scans with a good speed online and is…☆80Updated 8 months ago
- Personal notes from Red teamer for Blue/Red/Purple.☆55Updated last year
- redteamrecipe.com☆24Updated last year
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆108Updated 5 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Updated last year
- ES ToolKit is a standalone solution to navigate and backup data for a wide range of Elasticsearch and Kibana versions.☆86Updated 2 years ago
- A very fast and smart web directory and file enumeration tool written in C.☆143Updated last month
- Red Team Stuffs☆19Updated 3 years ago
- An Interface for AI built for cybersecurity professionals☆92Updated 8 months ago
- DNSWatch - DNS Traffic Sniffer and Analyzer☆205Updated 8 months ago
- ☆195Updated 2 years ago
- 👀CVE Simple List☆71Updated this week