hanhanhanz / cyber-security-sourcesLinks
List of resources about CyberSecurity such as CTF, DFIR, Offsec, etc
☆10Updated last month
Alternatives and similar repositories for cyber-security-sources
Users that are interested in cyber-security-sources are comparing it to the libraries listed below
Sorting:
- List of bug bounty programs of companies/organisations in Switzerland☆13Updated 3 years ago
- Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links on…☆54Updated 3 years ago
- This small script can download or update all the GitHub repo of your choice.☆21Updated last year
- Python script implementing the favicon hash trick to find subdomains.☆36Updated 2 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Updated 2 years ago
- This page should help you with the recon for security issues.☆21Updated 2 years ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆18Updated 2 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆53Updated 2 years ago
- Payloads and Lists☆22Updated 5 years ago
- ☆23Updated 3 years ago
- The hacker technical cheat sheet☆39Updated last week
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆28Updated 2 years ago
- ☆29Updated 3 years ago
- ☆85Updated 7 years ago
- ☆15Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- ☆10Updated last week
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆20Updated last year
- Automate bug bounty recon using bash alias☆14Updated 10 months ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆37Updated last year
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Updated 2 years ago
- XSS PoCs to elevate your alert()☆17Updated 2 years ago
- CTF and Bug Bounty Hunting WriteUps.☆19Updated last month
- port+dir+param bruteforcing at the same time using ffuf☆17Updated 10 months ago
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆19Updated 3 years ago
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Updated 4 months ago
- XSS scanning with Dalfox on Github-action☆25Updated last year
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆13Updated 3 years ago
- Source of swisskyrepo.github.io - Public☆23Updated last month
- A collection of tutorials, CTFs, wargames, articles, and other resources for Smart Contract security.☆14Updated 3 years ago