dx7er / ResourcesLinks
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
☆15Updated 2 years ago
Alternatives and similar repositories for Resources
Users that are interested in Resources are comparing it to the libraries listed below
Sorting:
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Updated 5 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Updated 2 years ago
- Search Google Dorks like Chad. / Broken link hijacking tool.☆30Updated 4 months ago
- ☆14Updated 3 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Updated 2 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆21Updated 4 months ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆35Updated 11 months ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Updated 3 years ago
- web based c2 🏴☠️☆15Updated last year
- Web-See is Tool For Checkout Status Of Urls in Mass Its For Bug Bounty Hunters And Black Hat Hackers It Will Save Your Valuable Time Scr…☆15Updated 3 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆28Updated 2 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆16Updated 2 years ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Updated 9 months ago
- my own 2fa bypass methodolgy☆27Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 3 years ago
- ☆20Updated 3 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Updated last year
- Red Teaming Tactics and Techniques☆13Updated 4 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Updated 3 years ago
- DroidSniper - Misconfigured Android Debug Bridge Scanner☆13Updated last year
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Automated enumeration for red teamers☆10Updated 3 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆18Updated last year
- Many times I have asked myself how to maintain access to a compromised WordPress site for the sake of surveillance/data gathering/etc... …☆26Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Updated 2 years ago
- A WAF Bypass tool assisting in the use of SQLMap Tampers list according to specific WAF vendors.☆17Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Updated last year
- This is a working variant of the Mirai IOT botnet☆15Updated 3 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Updated 3 years ago