naemazam / terminal-portfolioLinks
An ordinary website can make and use by everyone. so What is The difference between a Geek and common people?
☆19Updated 4 years ago
Alternatives and similar repositories for terminal-portfolio
Users that are interested in terminal-portfolio are comparing it to the libraries listed below
Sorting:
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated 2 years ago
- Offensive Security Vault structure for Obsidian☆20Updated 2 years ago
- capNcook - a dark web exploration tool☆115Updated last year
- Play Hack The Box directly on your system.☆51Updated 2 months ago
- A personal portfolio relating to cybersecurity and hacking☆29Updated last year
- A comprehensive guide to becoming a hacker, covering skills, tools, and best practices to master cybersecurity and hacking techniques.☆13Updated 4 months ago
- Writeups on my TryHackMe adventures!☆60Updated 2 years ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your car…☆33Updated last week
- Obsidian Markdown Cybersecurity Notes☆28Updated last year
- Writeups for TryHackMe and HackTheBox.☆20Updated last week
- Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delive…☆41Updated 6 months ago
- Making your own CTF☆26Updated 4 years ago
- ☆42Updated 3 years ago
- 🔒 TryHackMe - Home Work ! 📝☆39Updated 10 months ago
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆86Updated this week
- These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation☆18Updated 4 years ago
- A Python replicated exploit for Webmin 1.580 /file/show.cgi Remote Code Execution☆41Updated 4 years ago
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆60Updated last year
- Personal blog about cyber security and challenges☆18Updated last year
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited☆20Updated last year
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆12Updated 2 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆76Updated 8 months ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Updated last year
- Here are the most interesting Shodan dorks (according to me)☆93Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆276Updated last year
- List of sources for cybersecurity news☆39Updated 2 years ago
- Bash For Ethical Hacking☆72Updated 2 years ago
- Source of swisskyrepo.github.io - Public☆27Updated 3 months ago
- PrivacyNet: Privacy Network☆50Updated last year
- Magicspoofing it's a python script that checks & test SPF/DMARC DNS records an tries to spoof a domain with a open relay mail system.☆54Updated 7 months ago