Source code for Hacker101.com - a free online web and mobile security class.
☆16Apr 28, 2022Updated 3 years ago
Alternatives and similar repositories for hacker101
Users that are interested in hacker101 are comparing it to the libraries listed below
Sorting:
- Intelligence gathering framework☆16Jul 23, 2015Updated 10 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Port Swigger Labs divided on the based of level and topic.☆14Mar 15, 2022Updated 4 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- The labs for my Udemy course (https://www.udemy.com/course/intro-to-bug-bounty-by-nahamsec)☆473May 20, 2023Updated 2 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- A small and fast bash script to automate LFI vulnerability.☆11Nov 21, 2022Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆14Jul 3, 2025Updated 8 months ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Sep 23, 2015Updated 10 years ago
- Yet another subdomain finder☆210Jan 20, 2020Updated 6 years ago
- A collection of presentations and other contributions I have made to conferences.☆36Sep 9, 2024Updated last year
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- Programs I Made while learning python for pentesters.☆20Aug 26, 2022Updated 3 years ago
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆23Nov 22, 2019Updated 6 years ago
- Traverse JS files for APIs/Endpoints☆15May 12, 2015Updated 10 years ago
- My personal repository☆13Jan 18, 2026Updated 2 months ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆19Aug 11, 2022Updated 3 years ago
- ☆13Mar 29, 2024Updated last year
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆25Aug 1, 2022Updated 3 years ago
- Other tools developed by CIRT.net☆24Aug 2, 2020Updated 5 years ago
- convert secret patterns to gf compatible.☆38Feb 11, 2023Updated 3 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 4 years ago
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆20Mar 13, 2023Updated 3 years ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Mar 29, 2021Updated 4 years ago
- ☆63Jul 23, 2024Updated last year
- Solutions from @PortSwigger labs☆13Apr 11, 2024Updated last year
- Memory Forensic System on Cloud☆92Dec 21, 2023Updated 2 years ago
- A comprehensive curated list of available Blockchain Bug Bounty Programs.☆79Feb 22, 2019Updated 7 years ago
- Interactive Threat Intelligence Bot that leverages serverless framework, AWS/GCP, and Slack☆27Nov 3, 2019Updated 6 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 3 years ago
- ☆25Aug 19, 2024Updated last year
- burp extender for fuzzing☆10Aug 10, 2018Updated 7 years ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- A plugin to get our hackerone reports data into obsidian☆12Jan 28, 2026Updated last month
- Simple recon using multiple tools!☆165Jan 10, 2022Updated 4 years ago
- E-mails, subdomains and names Harvester - OSINT☆11Jan 17, 2020Updated 6 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- My nots from Web application Hacker's Handbook☆18Nov 22, 2021Updated 4 years ago