A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.
☆53Apr 7, 2026Updated last week
Alternatives and similar repositories for hackify
Users that are interested in hackify are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated last year
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated last year
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆610Mar 14, 2026Updated last month
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆20Jan 9, 2024Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated 2 years ago
- Cisco Certified CyberOps Associate 200-201 Certification Guide, published by Packt☆29Jan 30, 2023Updated 3 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- Automated tool for domains & Subdomains Gathering☆14Feb 26, 2026Updated last month
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- Simple tmux session management.☆16Dec 16, 2023Updated 2 years ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- ☆23Feb 14, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- Fast path fuzzing for hidden web directories.☆18Aug 6, 2025Updated 8 months ago
- CHAOS RAT web panel path RCE PoC☆30Apr 15, 2024Updated last year
- CVE-2025-3248 Langflow RCE Exploit☆17Jun 17, 2025Updated 9 months ago
- Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration …☆10Nov 17, 2025Updated 4 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆78May 16, 2024Updated last year
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- Find Cve Exploits/POC from github☆17Jul 6, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Practical labs, notes, and reports for CEH v13 modules — covering web hacking, network pentesting, malware analysis, social engineering, …☆91Jan 28, 2026Updated 2 months ago
- CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server☆38Jul 6, 2024Updated last year
- XSS PoCs to elevate your alert()☆23May 18, 2023Updated 2 years ago
- This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which y…☆74Oct 25, 2024Updated last year
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆162Aug 28, 2025Updated 7 months ago
- ☆24Dec 3, 2025Updated 4 months ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆18Aug 30, 2023Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- Guía completa para configurar y utilizar servicios financieros NO-KYC. Este repositorio cubre herramientas de finanzas digitales anónimas…☆16Aug 7, 2024Updated last year
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆13Jun 24, 2025Updated 9 months ago
- ☆13Oct 21, 2024Updated last year
- Flipper Zero firmware and remote archive management☆22Mar 28, 2026Updated 2 weeks ago
- FARO - Document Sensitivity Detector☆10Sep 30, 2022Updated 3 years ago