Built to learn ethical hacking on your own
☆145May 3, 2024Updated 2 years ago
Alternatives and similar repositories for Self-Way
Users that are interested in Self-Way are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Self-installation for ethical hacking☆34Sep 7, 2023Updated 2 years ago
- How to install Kali in VirtualBox☆14May 3, 2024Updated 2 years ago
- New Blood Project☆82Apr 3, 2024Updated 2 years ago
- Free courses☆72Apr 1, 2023Updated 3 years ago
- Save time on collecting subdomains, attributing IPs and then basic nmap scan.☆14Oct 30, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Usefull telegram for data leaks, tutorials, free course.☆117Aug 20, 2024Updated last year
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Apr 6, 2025Updated last year
- GhostSec Scam Detection Tool☆17Feb 11, 2021Updated 5 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 3 years ago
- backdoor exploit for vsftpd 2.3.4 on python☆16Oct 14, 2023Updated 2 years ago
- DDoS tool in Italiano☆14Nov 15, 2022Updated 3 years ago
- Repository of various scripts related to Mobile PT. Copyrights and Licensing terms belong to respective owners.☆12Nov 4, 2019Updated 6 years ago
- Google Hack Database Web Site Scrapper w/ DB updater utility. ASP.NET MVC web utility and Windows application for generating google hack …☆11Jun 23, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona…☆18Oct 16, 2024Updated last year
- CEH Practical Resources, Learning, Tutorials | Certified Ethical Hacker☆34Mar 19, 2021Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose☆17Feb 24, 2023Updated 3 years ago
- PoC-Malware-TTPs☆49Mar 26, 2023Updated 3 years ago
- ☆30Jul 5, 2023Updated 2 years ago
- My personal collection of nuclei templates made for fuzzing.☆29Sep 6, 2024Updated last year
- Config files for my GitHub profile.☆10Jan 13, 2024Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆87May 5, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- contains Evil Files separated from PyHTools project to comply with PyPi's acceptable use policy☆22Jan 8, 2026Updated 3 months ago
- CVE-2023-23192☆13Mar 27, 2023Updated 3 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Apr 2, 2026Updated last month
- Web app tool for helping compose advance search operators (aka Google dorking AKA boolean searches) for a variety of search engines☆35May 9, 2023Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆52Jun 27, 2024Updated last year
- H.I.V.E is an automated OSINT (Open Source Intelligence) multi-tool that enables efficient data gathering from various sources through th…☆304Jul 21, 2024Updated last year
- An Advanced Darkweb OSINT Tool☆24Jun 19, 2025Updated 10 months ago
- Username recon OSINT. Accurate hits! New sites to check, Simple and powerful tool. Goverments use this tool or similar tools built in dif…☆18Feb 19, 2026Updated 2 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆22Feb 12, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15May 30, 2023Updated 2 years ago
- Your subdomains are free for the taking - no API key, no mistaking! 🕺☆37Feb 27, 2023Updated 3 years ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 6 months ago
- Automated HTTP Request Repeating With Burp Suite☆39Apr 3, 2023Updated 3 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- Subtron is a professional grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Feb 14, 2026Updated 2 months ago
- Advanced web fuzzer with machine learning capabilities, stealth features, and intelligent pattern generation.☆17Mar 29, 2025Updated last year