UsagiB4 / Vulnerable-Machines-for-Pentesting-and-HackingLinks
This is a collection of vulnerable machines that can help you to learn hacking, pentesting and bug hunting. I know there are a lot of lists out there, but most of them are not updated regularly. So I decided to make on myself. Hope this will help you
☆10Updated 2 years ago
Alternatives and similar repositories for Vulnerable-Machines-for-Pentesting-and-Hacking
Users that are interested in Vulnerable-Machines-for-Pentesting-and-Hacking are comparing it to the libraries listed below
Sorting:
- ☆18Updated last week
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated 2 years ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆34Updated last year
- Repository to put my notes related to OSCP certification☆19Updated 5 years ago
- ☆40Updated 6 months ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆28Updated last year
- ☆29Updated 3 years ago
- Challenge Python☆19Updated 2 years ago
- A curated collection of CVEs, tools 🛠️, and scripts 📜 for vulnerability research, exploit testing, and cybersecurity analysis—perfect f…☆13Updated 3 weeks ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Educational repository with source code examples☆12Updated 3 weeks ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Updated 2 years ago
- 🤖 The Modern Port Scanner 🤖☆19Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Pentest/Red Team: Resources, repos and scripts.☆70Updated this week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Updated 2 years ago
- Notes for red teamers - from cloud to Active Directory to many things in between.☆59Updated last year
- Red Teaming tools and techniques☆52Updated 2 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- ☆99Updated 3 years ago
- CTF and Bug Bounty Hunting WriteUps.☆19Updated last month
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆13Updated 4 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆22Updated 2 years ago
- Cookie - Phishing - Altri strumenti utili - Rendersi Anonimi nel WEB - Messaggistica Sicura☆22Updated 2 months ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- ☆31Updated 3 years ago
- A simple pentest container equipped with common python pentest tools.☆41Updated 4 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Updated 2 years ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆31Updated last week