dx7er / ResourcesLinks
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
☆14Updated 2 years ago
Alternatives and similar repositories for Resources
Users that are interested in Resources are comparing it to the libraries listed below
Sorting:
- MITM to Capture FTP Credentials☆14Updated 3 years ago
- ☆14Updated 3 years ago
- medor is an OSINT tool that enables you to discover a WordPress website IP behind a WAF or behind Onion Services.☆18Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Updated 2 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Updated 3 years ago
- Search Google Dorks like Chad. / Broken link hijacking tool.☆30Updated 4 months ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Updated 2 years ago
- Web-See is Tool For Checkout Status Of Urls in Mass Its For Bug Bounty Hunters And Black Hat Hackers It Will Save Your Valuable Time Scr…☆15Updated 3 years ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆35Updated 11 months ago
- Simple python3 script to automate CVE-2018-9995☆11Updated last year
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆16Updated 2 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆20Updated 3 months ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆18Updated last year
- web based c2 🏴☠️☆15Updated last year
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Updated 2 years ago
- POC exploit for CVE-2015-10141☆30Updated 5 months ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Updated last year
- Who We Are☆21Updated last year
- Smart and efficient tool to automate open redirect detection at scale.☆10Updated 3 years ago
- ☆14Updated 10 months ago
- my own 2fa bypass methodolgy☆27Updated 2 years ago
- Social Engineering Browser Update Attack.☆59Updated 2 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Updated 3 years ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Updated 8 months ago
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Updated last year
- A small and efficient tool to find open redirect vulnerabilities.☆17Updated 4 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Updated 5 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Updated 3 years ago
- WP Juicer Tool for quick scanning of confidential information on WordPress endpoints.☆10Updated last year
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆37Updated last year