XeusHack / Awesome-Hacking-Practice
A curated list of websites and apps to help you practice hacking
☆22Updated 5 years ago
Alternatives and similar repositories for Awesome-Hacking-Practice:
Users that are interested in Awesome-Hacking-Practice are comparing it to the libraries listed below
- Cryptocurrencies related Security resources☆14Updated last year
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Software exploitation training material☆15Updated 7 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Updated 6 years ago
- pentest toolbox☆28Updated 2 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆21Updated 6 years ago
- NmapPy - Python implementation of Nmap☆35Updated 6 years ago
- ☆17Updated 9 months ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 6 years ago
- Automated Google dorking with custom search engines☆26Updated 4 years ago
- Determine everything you need to know to about a system☆30Updated 6 years ago
- w3af packaging for Kali distribution☆26Updated 8 years ago
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆19Updated 7 years ago
- MS17-010☆12Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- My metasploit modules☆11Updated 9 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆10Updated 7 years ago
- Small subset of Bash and Python scripts which could be used for rapid network recon☆12Updated 2 years ago
- Listing subdomains about a main domain☆58Updated 6 years ago