Free courses
☆72Apr 1, 2023Updated 2 years ago
Alternatives and similar repositories for ressources_learning
Users that are interested in ressources_learning are comparing it to the libraries listed below
Sorting:
- Save time on collecting subdomains, attributing IPs and then basic nmap scan.☆14Oct 30, 2022Updated 3 years ago
- New Blood Project☆81Apr 3, 2024Updated last year
- Self-installation for ethical hacking☆32Sep 7, 2023Updated 2 years ago
- How to install Kali in VirtualBox☆14May 3, 2024Updated last year
- Automated task after new installation of Kali Linux + NewBlood helper☆39Sep 7, 2023Updated 2 years ago
- Built to learn ethical hacking on your own☆142May 3, 2024Updated last year
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆284Mar 5, 2025Updated last year
- BitRAT CrackedIt is coded in C++ programming language. It is the latest version of the best PC RAT 2022 in the market. It is used by hack…☆27Jul 12, 2022Updated 3 years ago
- GhostSec Scam Detection Tool☆15Feb 11, 2021Updated 5 years ago
- ☆12Dec 26, 2021Updated 4 years ago
- Script for Reconnaissance(Bug Bounty)☆18May 15, 2022Updated 3 years ago
- Crawls URL to get a better image of what is tied to a website.☆33Jul 9, 2023Updated 2 years ago
- Check if domain has bug bounty program or not☆28Jul 28, 2023Updated 2 years ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆41Apr 10, 2023Updated 2 years ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your car…☆33Feb 24, 2026Updated last week
- Starter Projects for the Docker Course☆11Dec 25, 2025Updated 2 months ago
- digimat.saia is a Python 3 module allowing anyone to create client and/or server SAIA PCD EtherSBus nodes. This code allow you to create …☆12Nov 10, 2020Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- A C2 framework inspired by anime, made in python.☆12Feb 8, 2026Updated 3 weeks ago
- The control unit and trainer☆12Oct 3, 2022Updated 3 years ago
- ☆15Jul 3, 2025Updated 8 months ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- ☆12Updated this week
- ☆11Updated this week
- Source code related of the articles posted in medium.com☆12Nov 2, 2020Updated 5 years ago
- Soundify exit codes☆11Nov 15, 2020Updated 5 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- My blog☆10Oct 6, 2025Updated 5 months ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- Lab Material for the One-Day Web Application Penetration Testing Fundamentals Course☆10Jun 22, 2021Updated 4 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- ☆10May 6, 2017Updated 8 years ago
- ☆14Dec 4, 2021Updated 4 years ago
- ☆12Jan 28, 2023Updated 3 years ago