Tracking my progress for 100 days learning something new daily....
☆21May 7, 2023Updated 2 years ago
Alternatives and similar repositories for 100daysofcyber
Users that are interested in 100daysofcyber are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- Bug Bounty & Other Stuff☆58Dec 16, 2021Updated 4 years ago
- Welcome to MitreMesh. Where MITRE's framework meets dynamic scenario generation, creating a comprehensive net of incident response tests …☆17Sep 5, 2023Updated 2 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- Ultimate Google Dork Lists OSWP top 10☆58Aug 6, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Updated 6000 Sql Injection Google Dork 2021☆41Jul 13, 2021Updated 4 years ago
- ☆32Sep 19, 2020Updated 5 years ago
- ☆47Jan 14, 2024Updated 2 years ago
- Extract endpoints from source files.☆25Mar 28, 2023Updated 2 years ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- RedirectHunter is a powerful open redirect vulnerability scanner that helps you quickly identify and mitigate potential security risks in…☆12Apr 21, 2023Updated 2 years ago
- Mobile Pentesting Guide (WIP)☆26May 13, 2020Updated 5 years ago
- Leverage the Intel® Distribution of OpenVINO™ Toolkit to fast-track development of high-performance computer vision and deep learning inf…☆10Jul 28, 2020Updated 5 years ago
- WARZONE RAT 1.71 CRACKED by UNKNOWN-Remote Administration Trojan-RAT☆14Aug 11, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Machine Learning-based tool for Cybersecurity Risk Assessment☆12Jul 18, 2021Updated 4 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 4 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 4 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- ☆13Jul 12, 2025Updated 8 months ago
- Create LAMP Stack using terraform with AWS☆11Feb 15, 2023Updated 3 years ago
- AWS CIS Controls module for terraform☆11Nov 16, 2023Updated 2 years ago
- Tool designed for fast crawl and extract endpoints☆16Apr 5, 2021Updated 4 years ago
- A collection of custom built scripts to exploit known vulnerability chains☆25Jul 23, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Burp-Suite Professional v1.7.37 Cracked☆19Sep 9, 2025Updated 6 months ago
- Leaked AzoRult Panel☆17Jun 12, 2019Updated 6 years ago
- Pre-commit, pre-push, rust-centric☆20Mar 5, 2026Updated 3 weeks ago
- A curated collection of courses, videos, and resources to master network security from the ground up.☆10Jan 6, 2025Updated last year
- Implementing ISO/IEC 27001:2022, by EC-Council☆16Feb 20, 2026Updated last month
- CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42☆20Nov 21, 2019Updated 6 years ago
- htop for Windows . TUI system monitor with per-core CPU bars, memory/swap/network, tree view, process kill, 7 color schemes, mouse suppor…☆55Mar 19, 2026Updated last week
- A penetration testing tool for firestore databases☆13Nov 5, 2020Updated 5 years ago
- ☆19Nov 23, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- AWS Cloudformation template for MongoDB cluster with replicas set and Automatic Scale, support Spot Instance.☆15Jul 9, 2025Updated 8 months ago
- ☆10Nov 29, 2025Updated 3 months ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆12Sep 19, 2023Updated 2 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- ☆14May 5, 2024Updated last year
- Generate beautiful letters for your loved ones☆16May 9, 2021Updated 4 years ago