Tracking my progress for 100 days learning something new daily....
☆21May 7, 2023Updated 2 years ago
Alternatives and similar repositories for 100daysofcyber
Users that are interested in 100daysofcyber are comparing it to the libraries listed below
Sorting:
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- Extract endpoints from source files.☆25Mar 28, 2023Updated 2 years ago
- Ultimate Google Dork Lists OSWP top 10☆58Aug 6, 2024Updated last year
- Mobile Pentesting Guide (WIP)☆25May 13, 2020Updated 5 years ago
- Bug Bounty & Other Stuff☆58Dec 16, 2021Updated 4 years ago
- ☆10May 5, 2024Updated last year
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- Updated 6000 Sql Injection Google Dork 2021☆41Jul 13, 2021Updated 4 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- Machine Learning-based tool for Cybersecurity Risk Assessment☆11Jul 18, 2021Updated 4 years ago
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆19Aug 10, 2025Updated 6 months ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆24Nov 12, 2025Updated 3 months ago
- Implementing ISO/IEC 27001:2022, by EC-Council☆16Feb 20, 2026Updated 2 weeks ago
- ☆10Nov 29, 2025Updated 3 months ago
- ☆47Jan 14, 2024Updated 2 years ago
- ☆16Apr 23, 2024Updated last year
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- This script searches NVD's website for new CVES, alerting you by email or telegram. You can configure a list of products that interest yo…☆11Mar 21, 2021Updated 4 years ago
- A penetration testing tool for firestore databases☆13Nov 5, 2020Updated 5 years ago
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆14Aug 23, 2022Updated 3 years ago
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- Shellcode loader with evasion capabilities written in Nim☆15Jan 25, 2025Updated last year
- Various scripts & tools☆12Apr 22, 2024Updated last year
- 🧿Join your two exe files☆11Jul 14, 2020Updated 5 years ago
- u-blox Linux Kernel repository☆12Jan 29, 2016Updated 10 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- Attempt to grind out the 100 offsec project challenges, conceptualized by github user, @kurogai, at his repo [https://github.com/kurogai/…☆15Jul 16, 2024Updated last year
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- ☆12Jun 16, 2021Updated 4 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆16Sep 10, 2025Updated 5 months ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆12Sep 19, 2023Updated 2 years ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆12Feb 19, 2022Updated 4 years ago
- ☆11Jun 19, 2024Updated last year
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Mar 23, 2025Updated 11 months ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago