HackList: Your go-to AI-powered guide to hands-on cybersecurity learning!
β23Jul 6, 2025Updated 10 months ago
Alternatives and similar repositories for HackList
Users that are interested in HackList are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generate your resume in markdown easily from Github actions β using discussion section π πβ37Dec 4, 2025Updated 5 months ago
- Deep learning final year projects offer students the opportunity to explore the latest advancements in artificial intelligence and apply β¦β31Updated this week
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC β¦β21Mar 27, 2024Updated 2 years ago
- Beginner Road map that paves the way for your journey into the captivating world of cyber security based on job roles.β25Jan 27, 2024Updated 2 years ago
- π‘οΈ ClickShield is a modern, user-friendly web application that helps users identify potentially malicious websites and phishing attemptsβ¦β13Nov 8, 2025Updated 6 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- β16Feb 2, 2025Updated last year
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It β¦β71Jun 5, 2025Updated 11 months ago
- β16Jan 5, 2025Updated last year
- Professional Phishing Awareness & Cybersecurity Education Platformβ24Oct 17, 2025Updated 7 months ago
- The Vulnerability Assessment Β project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using Nβ¦β17Mar 4, 2024Updated 2 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eacβ¦β19Jul 29, 2024Updated last year
- This repository holds some very beginner projects that I worked on related to cybersecurity.β25Sep 23, 2024Updated last year
- Basic tool for Information Gathering πβ27Mar 26, 2024Updated 2 years ago
- a simple keylogger in python that sends the keystrokes to the server (Telegram)β23Apr 8, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A powerful Burp Suite extension that imports Postman collectionsβ31Aug 1, 2025Updated 9 months ago
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.β21May 26, 2025Updated 11 months ago
- A simple Node.js Express REST app with some OWASP vulnerabilities.β23May 14, 2026Updated last week
- This is a project to perform a BRUTE FORCE attack on a self hosted website to better the understanding of the importance of cybersecurityβ¦β32Jul 6, 2024Updated last year
- Presentation slides, blogs, and videos of my conference presentations.β26Jan 31, 2024Updated 2 years ago
- β16Dec 28, 2024Updated last year
- Kubernetes Integration Test Support for Java. Moved to fabric8 client: https://github.com/fabric8io/kubernetes-client/blob/main/doc/kube-β¦β14Apr 10, 2024Updated 2 years ago
- Everything you need to prepare for the Microsoft 365 Certified: Endpoint Administrator Associate!β26Dec 16, 2023Updated 2 years ago
- A comprehensive collection of resources designed to help you enhance the security of your APIs. In this repository, you'll find a wide raβ¦β32Nov 6, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Password Manager is a simple and secure application designed to store and manage your passwords. Developed using Java, it employs AES encβ¦β57Sep 10, 2024Updated last year
- β20Mar 7, 2024Updated 2 years ago
- Here is useful scripts collections. You can forge tickets locally with secret keys or certificates. It's useful when you want backdoor/peβ¦β19Apr 6, 2024Updated 2 years ago
- β49Nov 19, 2025Updated 6 months ago
- β57Jan 11, 2023Updated 3 years ago
- Play Hack The Box directly on your system.β58Feb 1, 2026Updated 3 months ago
- A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities fouβ¦β90Nov 25, 2025Updated 5 months ago
- A list of the best cybersecurity research related blogs.β33May 26, 2025Updated 11 months ago
- HERE COMPLETE DSA QUESTIONS RELATED TO COMPETETIVE PROGRAMMING AND INTERNSHIP/PLACEMENTSβ18Aug 27, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Repo for malware development practices I post on my blogβ36Oct 5, 2024Updated last year
- Resources for ethical hacking/penetration testers.β15Jun 23, 2021Updated 4 years ago
- Caesar Cipherβ37Oct 8, 2025Updated 7 months ago
- My own tailored roadmap, to my web3 / smart contract auditor knowledge.β55Jun 14, 2023Updated 2 years ago
- β23Apr 8, 2026Updated last month
- List of AI Hacking Agentsβ244May 4, 2026Updated 2 weeks ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.β12Feb 3, 2024Updated 2 years ago