This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
☆175Dec 27, 2025Updated 3 months ago
Alternatives and similar repositories for Information-Security-Tasks
Users that are interested in Information-Security-Tasks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- ☆34Jun 23, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆19Aug 20, 2017Updated 8 years ago
- Tips For Bug Bounty Hunters☆86Jul 16, 2022Updated 3 years ago
- basic bbtools , buggy , not recommended to use☆35Jan 22, 2025Updated last year
- You can read the writeup on this script here☆272Jul 12, 2020Updated 5 years ago
- My Tools For Bug Bounty☆70Sep 23, 2024Updated last year
- Tools, Resources & Helpful Tips☆14Jul 21, 2022Updated 3 years ago
- This is a Recon & Inoformation Garhering Methodology In Bug Hunting Process☆15Sep 22, 2022Updated 3 years ago
- This are some Dorks and Platform to find the Bug Bounty Programs.☆82Apr 11, 2025Updated last year
- Additional Resources For Securing The Stack Tutorials☆40Sep 9, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Security, Compliance and Informational Dashboard System☆25May 12, 2021Updated 4 years ago
- Recon_profile☆38May 18, 2020Updated 5 years ago
- An actively maintained, Self curated notes related to android application security for security professionals, bugbounty hunters, pentes…☆224Aug 26, 2021Updated 4 years ago
- Find Cve Exploits/POC from github☆17Jul 6, 2021Updated 4 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆136Sep 25, 2019Updated 6 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 10 months ago
- Collection of methodology and test case for various web vulnerabilities.☆7,078Jun 25, 2025Updated 9 months ago
- Pentesting/Bugbounty Dockerfiles.☆178May 29, 2021Updated 4 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆26Feb 21, 2026Updated last month
- ☆30Jan 7, 2021Updated 5 years ago
- OWASP Coimbatore's Web & Project Repository☆13Mar 24, 2026Updated 3 weeks ago
- ☆25Aug 19, 2024Updated last year
- ☆19Jun 24, 2021Updated 4 years ago
- ☆15May 22, 2021Updated 4 years ago
- ☆37Jun 23, 2022Updated 3 years ago
- CTF box with most tools installed☆89Aug 22, 2018Updated 7 years ago
- It's collection of my learning during 100 days .☆35Jan 31, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127May 30, 2018Updated 7 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Feb 20, 2019Updated 7 years ago
- This script grab public report from hacker one and make some folders with poc videos☆910Oct 10, 2025Updated 6 months ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago