Basic knowledge requirements for cybersecurity and hacking copied from @hackermaderas
☆63Jun 4, 2019Updated 6 years ago
Alternatives and similar repositories for Basic-knowledge-requirements-for-cybersecurity-and-hacking
Users that are interested in Basic-knowledge-requirements-for-cybersecurity-and-hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Virtual scenario for Network Penetration Testing☆14Mar 19, 2017Updated 9 years ago
- Reconnaissance test in Kubernetes clusters☆21Oct 19, 2018Updated 7 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Sep 29, 2022Updated 3 years ago
- ☆10Feb 22, 2023Updated 3 years ago
- Generates permutations, alterations and mutations of subdomains. Auto Resolve what we find.☆11Dec 8, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- CVE, reports, research☆15Mar 17, 2021Updated 5 years ago
- Alpha version code of Recon UI☆15Feb 26, 2018Updated 8 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆54Mar 11, 2024Updated 2 years ago
- An emulator/debugger/disassembler I made for 8080☆16Nov 17, 2018Updated 7 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Sep 24, 2019Updated 6 years ago
- knityak code for generating art for knit scarves☆11Jun 17, 2019Updated 6 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- A collection of random scripts.☆10Jul 20, 2015Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- SecistSploit☆17Dec 6, 2018Updated 7 years ago
- CTF collaboration tool for teams☆10Nov 10, 2017Updated 8 years ago
- Extract SSL certificate data (Subject Name, Subject Alt Names, Organisation)☆42Nov 10, 2025Updated 5 months ago
- Collection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQL…☆62May 4, 2017Updated 8 years ago
- Following OWASP TOP 10 (the top ten most critical web application security risk) I decided to build an XSS Scanner.☆12Dec 12, 2022Updated 3 years ago
- Tool for test XSS vulnerabilities of a site☆18Apr 1, 2018Updated 8 years ago
- Subdomain Enumeration Wordlist. 8956437 unique words. Updated.☆75May 23, 2020Updated 5 years ago
- XSS Hunter Burp Plugin☆151Aug 31, 2018Updated 7 years ago
- Hacker-gems installs most needed gems for hackers☆13Aug 3, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Facebook Bug Bounties☆106Feb 24, 2021Updated 5 years ago
- A place to store my own wordlists, and link to others that are useful☆108Nov 15, 2023Updated 2 years ago
- WinDbg script to spoof origin and url of a renderer process in Chrome☆25Dec 2, 2020Updated 5 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- Contains Some example codes for using LVGL | ESP32☆13Jan 29, 2024Updated 2 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- ☆100Oct 7, 2023Updated 2 years ago
- FortranCL: a Fortran 90 interface for OpenCL☆11Jun 27, 2024Updated last year
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Various items related to running linux on a Lenovo Yoga c630.☆11Dec 18, 2020Updated 5 years ago
- simple webserver to interact with pandoc and generate PDFs from markdown☆17Apr 10, 2026Updated last week
- ADB Download All Files - A dirty shell script to adb pull all readable files using adb pull & base64☆25Jun 17, 2021Updated 4 years ago
- ☆10Jan 13, 2024Updated 2 years ago
- GQL Burp Extension☆21Sep 16, 2022Updated 3 years ago
- MicroPython examples for Badgy☆15Jan 5, 2020Updated 6 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆136Sep 25, 2019Updated 6 years ago