Saltinbank-SyS / be-a-hacker
roadmap for being a self-taught hacker
☆7Updated last year
Alternatives and similar repositories for be-a-hacker:
Users that are interested in be-a-hacker are comparing it to the libraries listed below
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆21Updated last year
- gitbook of all pentesting knowledge☆20Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- legacy Botnets source code Forked from github.com/malwares☆21Updated 3 years ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆26Updated 2 years ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆16Updated 4 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 8 months ago
- Yet Another Mac Changer!!!☆12Updated 2 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Some good things for EXP-301 course☆11Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆16Updated 8 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- ☆12Updated 2 years ago
- VLAN attacks toolkit☆14Updated 2 years ago
- ☆12Updated 2 years ago
- ☆13Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 11 months ago
- Yet another powerful payload encoder/decoder☆14Updated 3 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆14Updated 2 years ago
- this nuclei template finds back up files☆19Updated 5 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆14Updated 3 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 2 months ago
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've…☆40Updated last year
- Control a system remotely via telegram☆33Updated 4 months ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆9Updated last year
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆14Updated 8 months ago
- OSINT tool for username, email and domains☆28Updated 10 months ago
- A Red Teaming tool focused on profiling the target.☆26Updated 9 months ago