Built to learn ethical hacking on your own
☆142May 3, 2024Updated last year
Alternatives and similar repositories for Self-Way
Users that are interested in Self-Way are comparing it to the libraries listed below
Sorting:
- Self-installation for ethical hacking☆32Sep 7, 2023Updated 2 years ago
- How to install Kali in VirtualBox☆14May 3, 2024Updated last year
- New Blood Project☆81Apr 3, 2024Updated last year
- ترجمه پروژه NewBlood به فارسی. زنان، زندگی، آزادی.☆39Mar 12, 2023Updated 2 years ago
- Free courses☆72Apr 1, 2023Updated 2 years ago
- Automated task after new installation of Kali Linux + NewBlood helper☆39Sep 7, 2023Updated 2 years ago
- Save time on collecting subdomains, attributing IPs and then basic nmap scan.☆14Oct 30, 2022Updated 3 years ago
- Crawls URL to get a better image of what is tied to a website.☆33Jul 9, 2023Updated 2 years ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆284Mar 5, 2025Updated last year
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona…☆18Oct 16, 2024Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Apr 5, 2023Updated 2 years ago
- Web app tool for helping compose advance search operators (aka Google dorking AKA boolean searches) for a variety of search engines☆35May 9, 2023Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- A Collection of Wordlists for Penetration Testing☆34Dec 13, 2025Updated 2 months ago
- Subtron is a professional grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Feb 14, 2026Updated 2 weeks ago
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- Google Hack Database Web Site Scrapper w/ DB updater utility. ASP.NET MVC web utility and Windows application for generating google hack …☆11Jun 23, 2016Updated 9 years ago
- wordpress xmlrpc + wp-login.php brute force☆10Mar 13, 2021Updated 4 years ago
- SIEM Visibility assessment☆14May 22, 2023Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- Repository of various scripts related to Mobile PT. Copyrights and Licensing terms belong to respective owners.☆12Nov 4, 2019Updated 6 years ago
- Grab form parameters easily☆14Dec 11, 2024Updated last year
- GhostSec Scam Detection Tool☆15Feb 11, 2021Updated 5 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- Learn how to be a hacker☆11Aug 29, 2023Updated 2 years ago
- ☆13Sep 8, 2024Updated last year
- Username recon OSINT. Accurate hits! New sites to check, Simple and powerful tool. Goverments use this tool or similar tools built in dif…☆18Feb 19, 2026Updated 2 weeks ago
- PoC-Malware-TTPs☆48Mar 26, 2023Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Dec 13, 2025Updated 2 months ago
- DDoS tool in Italiano☆14Nov 15, 2022Updated 3 years ago
- hacking tools☆14Jan 29, 2023Updated 3 years ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Jul 2, 2025Updated 8 months ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86May 5, 2023Updated 2 years ago
- WebApp for BugBounty Hunters☆14Mar 24, 2017Updated 8 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆16Mar 28, 2023Updated 2 years ago