agussetyar / awesome-reference
Reference list of useful links to learn about programming, networking, hacking, cybersecurity, ctf, bounty bug write-up, and more
☆96Updated 3 years ago
Related projects: ⓘ
- Panduan singkat untuk memulai belajar reverse engineering terutama software reversing atau reverse code engineering.☆81Updated 3 years ago
- Para pencari bug / celah kemanan bisa bergabung.☆79Updated 5 years ago
- CTF write-ups RevID.CTF team☆18Updated 4 years ago
- SecStory (Security Story) adalah buku digital yang berisi kumpulan donasi cerita, ditulis oleh para pemangku kepentingan keamanan siber d…☆74Updated 5 years ago
- A guide for amateurs pen testers and a collection of hacking tools, resources and references to practice ethical hacking, pen testing an…☆19Updated 11 months ago
- ☆31Updated this week
- ☆19Updated last year
- ☆15Updated this week
- LazyRev for Lazy People☆21Updated last year
- Material Untuk Belajar Cyber Security.☆45Updated 2 months ago
- PHP Shell untuk remote shell Web Server, upload dan sebagainya☆30Updated 2 years ago
- Echo Hack The Talk Materials 2019☆13Updated 5 years ago
- Kumpulan Course Video pembalajaran tentang Cyber Security & Hacking secara GRATIS, repositori ini akan membantu kita dalam proses pembela…☆236Updated 2 years ago
- TCP1P CTF writeup☆30Updated last year
- Payload untuk remote komputer target yang menggunakan Windows 7, 8.1 dan 10 yang memanfaatkan celah BadUSB. Payload ini dirancang khusus…☆24Updated 2 years ago
- Pentest Wording Database in Bahasa Indonesia.☆12Updated 11 months ago
- X-code Anti Admin adalah Program untuk untuk penghapusan jejak pada log di linux. Bisa digunakan dalam tahapan hacking ke 5 yaitu coverin…☆14Updated 2 years ago
- Unfriend inactive users☆38Updated 5 years ago
- ☆23Updated this week
- ☆10Updated 3 years ago
- My-Course-Materials☆34Updated 9 months ago
- Server Scanner detect rootkit and backdoor☆48Updated 2 months ago
- Writeup of security — CTFLearn Challenges.☆39Updated 3 years ago
- Enumerate & Fuzz Subdomains☆10Updated 3 years ago
- Tutorials written by me.☆45Updated 3 years ago
- ☆44Updated 3 years ago
- Set of Python programming challenge for cyber security (offensive / defensive)☆51Updated last year
- A simple Ransomware Generator☆32Updated 10 months ago
- The application consists of several vulnerable web applications that are integrated with Wazuh.☆15Updated last year
- a vulnerable web for education of hacking☆10Updated 3 years ago