UdeA - MisionTIC 2022: Retos
☆18Sep 17, 2021Updated 4 years ago
Alternatives and similar repositories for Java-MisionTIC-2022-UdeA-Retos
Users that are interested in Java-MisionTIC-2022-UdeA-Retos are comparing it to the libraries listed below
Sorting:
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆241Nov 4, 2020Updated 5 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆278Jan 14, 2023Updated 3 years ago
- Multi-threaded Python Port Scanner with Nmap Integration☆388Sep 4, 2022Updated 3 years ago
- BugBountyTips☆413Jul 31, 2025Updated 7 months ago
- Study Guide for the CEH v10☆437Jan 1, 2021Updated 5 years ago
- Work in progress...☆532Sep 20, 2024Updated last year
- Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the t…☆766Mar 11, 2022Updated 3 years ago
- This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machine…☆860Oct 23, 2022Updated 3 years ago
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆917Aug 30, 2023Updated 2 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆981Nov 27, 2023Updated 2 years ago
- In this repository you will find sample code files for each day of the course "Python for OSINT. A 21-day course for beginners".☆1,088Jan 6, 2026Updated 2 months ago
- Notion as a platform for offensive operations☆1,178May 21, 2023Updated 2 years ago
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used ag…☆1,637Aug 29, 2025Updated 6 months ago
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,732Jan 2, 2026Updated 2 months ago
- A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for id…☆1,777Sep 11, 2025Updated 5 months ago
- A big list of Android Hackerone disclosed reports and other resources.☆1,672Sep 10, 2025Updated 5 months ago
- A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.☆1,821Jun 28, 2022Updated 3 years ago
- Bug Bounty Roadmaps☆1,716Jun 12, 2021Updated 4 years ago
- awesome-linux-rootkits☆2,035Feb 15, 2026Updated 3 weeks ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,993Mar 13, 2024Updated last year
- ☆2,214Sep 20, 2023Updated 2 years ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,402Feb 24, 2023Updated 3 years ago
- 🎓 Because Education should be free. Contributions welcome! 🕵️☆2,779Aug 9, 2025Updated 6 months ago
- A list of Reverse Engineering articles, books, and papers☆2,651May 2, 2023Updated 2 years ago
- DNS Enumeration Script☆2,956Updated this week
- Create randomly insecure VMs☆2,747Updated this week
- A script that you can run in the background!☆3,055Jul 30, 2024Updated last year
- Find leaked secrets via github search☆3,144Oct 5, 2025Updated 5 months ago
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,659Updated this week
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,517Jan 5, 2026Updated 2 months ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,842Jan 1, 2025Updated last year
- Reverse Engineer's Toolkit☆5,172May 1, 2025Updated 10 months ago
- A curated list of resources for devs and designers. Join me on devcord.com if you are up for a chit chat :)☆5,009Jul 21, 2022Updated 3 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,609Updated this week
- A curated list of awesome infosec courses and training resources.☆5,594Nov 21, 2025Updated 3 months ago
- Notes for Beginner Network Pentesting Course☆6,206Sep 21, 2022Updated 3 years ago
- Top 100 Hacking & Security E-Books (Free Download)☆6,271Jul 26, 2024Updated last year
- An opinionated guide on how to become a professional Web/Mobile App Developer.☆5,961Feb 16, 2024Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,511Jan 18, 2026Updated last month