Basic knowledge requirements for cybersecurity and hacking copied from @hackermaderas
☆63Jun 4, 2019Updated 6 years ago
Alternatives and similar repositories for Basic-knowledge-requirements-for-cybersecurity-and-hacking
Users that are interested in Basic-knowledge-requirements-for-cybersecurity-and-hacking are comparing it to the libraries listed below
Sorting:
- ☆10Feb 22, 2023Updated 3 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Sep 29, 2022Updated 3 years ago
- An emulator/debugger/disassembler I made for 8080☆16Nov 17, 2018Updated 7 years ago
- Generates permutations, alterations and mutations of subdomains. Auto Resolve what we find.☆11Dec 8, 2020Updated 5 years ago
- Virtual scenario for Network Penetration Testing☆14Mar 19, 2017Updated 8 years ago
- CVE, reports, research☆15Mar 17, 2021Updated 4 years ago
- Reconnaissance test in Kubernetes clusters☆21Oct 19, 2018Updated 7 years ago
- Alpha version code of Recon UI☆15Feb 26, 2018Updated 8 years ago
- Following OWASP TOP 10 (the top ten most critical web application security risk) I decided to build an XSS Scanner.☆12Dec 12, 2022Updated 3 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- CTF write-ups by PDKT team with English and Indonesian language☆75Jun 3, 2019Updated 6 years ago
- ☆21May 1, 2021Updated 4 years ago
- simple code directory brute☆17Feb 26, 2021Updated 5 years ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- Extract SSL certificate data (Subject Name, Subject Alt Names, Organisation)☆42Nov 10, 2025Updated 3 months ago
- ADB Download All Files - A dirty shell script to adb pull all readable files using adb pull & base64☆25Jun 17, 2021Updated 4 years ago
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- A Tools For Spoon (https://spooncast.net), to Increase Tap Love, Fans, Viewers Of Fans, Report, and etc.☆10Nov 9, 2022Updated 3 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆54Mar 11, 2024Updated last year
- ☆23Mar 29, 2022Updated 3 years ago
- GQL Burp Extension☆21Sep 16, 2022Updated 3 years ago
- Tool for test XSS vulnerabilities of a site☆18Apr 1, 2018Updated 7 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- A Cross Site Scripting scanner using selenium webdriver☆55Nov 1, 2019Updated 6 years ago
- XSS Hunter Burp Plugin☆151Aug 31, 2018Updated 7 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Sep 24, 2019Updated 6 years ago
- Facebook Bug Bounties☆106Feb 24, 2021Updated 5 years ago
- Collection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQL…☆62May 4, 2017Updated 8 years ago
- ☆174Oct 26, 2025Updated 4 months ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- A place to store my own wordlists, and link to others that are useful☆108Nov 15, 2023Updated 2 years ago
- unicode abnormalizer to takes a unicode string and abnormalizes it by character replacment☆26Jun 27, 2020Updated 5 years ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆66Sep 18, 2021Updated 4 years ago
- Discovering all CIP communicating devices on a network☆11Dec 18, 2024Updated last year
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- NodeJS script to extract assets for the Apple bug bounty program from their security acknowledgments page for bug bounty recon.☆78Nov 5, 2022Updated 3 years ago
- This repository contains all the Talk slides that I have given at various security conferences, events & meetups.☆34Mar 4, 2021Updated 5 years ago