HackList: Your go-to AI-powered guide to hands-on cybersecurity learning!
☆24Jul 6, 2025Updated 9 months ago
Alternatives and similar repositories for HackList
Users that are interested in HackList are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Nov 22, 2025Updated 5 months ago
- Generate your resume in markdown easily from Github actions ✅ using discussion section 📃 🚀☆37Dec 4, 2025Updated 4 months ago
- Deep learning final year projects offer students the opportunity to explore the latest advancements in artificial intelligence and apply …☆30Apr 26, 2026Updated last week
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆21Mar 27, 2024Updated 2 years ago
- 🛡️ ClickShield is a modern, user-friendly web application that helps users identify potentially malicious websites and phishing attempts…☆14Nov 8, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆16Feb 2, 2025Updated last year
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆70Jun 5, 2025Updated 10 months ago
- Professional Phishing Awareness & Cybersecurity Education Platform☆24Oct 17, 2025Updated 6 months ago
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated 2 years ago
- A robust Python-based OSINT tool designed for validating and investigating email addresses across social media platforms and known data b…☆63Aug 6, 2025Updated 8 months ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- Get hands-on with OSINT tools such as Recon-ng, Maltego, Shodan and Sherlock☆28May 23, 2024Updated last year
- This repository holds some very beginner projects that I worked on related to cybersecurity.☆25Sep 23, 2024Updated last year
- Basic tool for Information Gathering 🚀☆27Mar 26, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- API discovery tool that maps attack surfaces from captured traffic and generates specs for REST, GraphQL, SOAP, and WebSocket APIs☆85Apr 26, 2026Updated last week
- a simple keylogger in python that sends the keystrokes to the server (Telegram)☆23Apr 8, 2026Updated 3 weeks ago
- ☆10Jan 23, 2023Updated 3 years ago
- A powerful Burp Suite extension that imports Postman collections☆31Aug 1, 2025Updated 9 months ago
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆19May 26, 2025Updated 11 months ago
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆22Aug 13, 2024Updated last year
- This is a project to perform a BRUTE FORCE attack on a self hosted website to better the understanding of the importance of cybersecurity…☆33Jul 6, 2024Updated last year
- You can gather useful information accounts by username across all types networks ( which also include social media)☆29Oct 19, 2023Updated 2 years ago
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆53Jul 1, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆16Dec 28, 2024Updated last year
- Thumbor engine for the openCV imaging library.☆26Jan 31, 2022Updated 4 years ago
- Everything you need to prepare for the Microsoft 365 Certified: Endpoint Administrator Associate!☆26Dec 16, 2023Updated 2 years ago
- A list of the best cybersecurity research related blogs.☆33May 26, 2025Updated 11 months ago
- ☆14Apr 15, 2024Updated 2 years ago
- Password Manager is a simple and secure application designed to store and manage your passwords. Developed using Java, it employs AES enc…☆56Sep 10, 2024Updated last year
- ☆20Mar 7, 2024Updated 2 years ago
- Here is useful scripts collections. You can forge tickets locally with secret keys or certificates. It's useful when you want backdoor/pe…☆20Apr 6, 2024Updated 2 years ago
- ☆49Nov 19, 2025Updated 5 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆55Jan 11, 2023Updated 3 years ago
- A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities fou…☆87Nov 25, 2025Updated 5 months ago
- HERE COMPLETE DSA QUESTIONS RELATED TO COMPETETIVE PROGRAMMING AND INTERNSHIP/PLACEMENTS☆18Aug 27, 2021Updated 4 years ago
- Resources for ethical hacking/penetration testers.☆15Jun 23, 2021Updated 4 years ago
- Caesar Cipher☆37Oct 8, 2025Updated 6 months ago
- My own tailored roadmap, to my web3 / smart contract auditor knowledge.☆54Jun 14, 2023Updated 2 years ago
- Visual diffs for BPMN 2.0 diagrams☆17May 19, 2022Updated 3 years ago