Hacking challenges
☆31Oct 3, 2017Updated 8 years ago
Alternatives and similar repositories for challenges
Users that are interested in challenges are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 8 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- The fastest (and least featureful) DNS bruteforcer in the South☆27Dec 31, 2019Updated 6 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- ☆26Sep 1, 2017Updated 8 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- FROM BEGINNER TO ADVANCED FOR ALL SECURITY ENTHUSIASTS.☆18Mar 23, 2018Updated 8 years ago
- Workshop Materials from DEFCON 25 (7/27/2017)☆22Jul 31, 2017Updated 8 years ago
- A writeup for things found and theories regarding the Mr Robot Season 3 ARG☆18Dec 12, 2017Updated 8 years ago
- ☆20Sep 8, 2019Updated 6 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- My pentest cheat sheet☆16Apr 27, 2017Updated 9 years ago
- A tool to enumerate network services☆24Oct 30, 2019Updated 6 years ago
- Scripts to control an "OSCP-like" lab environment.☆23Aug 14, 2017Updated 8 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆37Jan 8, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Some useful tools and scripts☆47Feb 11, 2023Updated 3 years ago
- ☆55Aug 18, 2020Updated 5 years ago
- extracts urls from text☆16Jul 13, 2018Updated 7 years ago
- Ucki's Recon & Enumeration Pack☆39May 9, 2016Updated 9 years ago
- A list of Information Security firms operating in th Asia-Pacific region, and where student intake opportunities can be found.☆24Oct 30, 2020Updated 5 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Dec 12, 2018Updated 7 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,003Jan 15, 2019Updated 7 years ago
- An example of a downloader written in NodeJS.☆24Apr 17, 2021Updated 5 years ago
- Multiplayer snake game written at a single weekend☆13Jul 10, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆79Sep 29, 2019Updated 6 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- This is a Burp extension for adding additional payloads to active scanner that require out-of-band validation. Works great with XSSHunter☆19Feb 16, 2017Updated 9 years ago
- ☆14Jun 19, 2018Updated 7 years ago
- Reverse IP Lookup Tool that allows you to use an IP address to identify all websites hosted on a server.☆10Jun 29, 2016Updated 9 years ago
- OpenSSH <=6.6 SFTP misconfiguration universal exploit☆27Mar 20, 2018Updated 8 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Apr 22, 2018Updated 8 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- Visualization of LVZ police ticker☆14Apr 30, 2026Updated last week
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Jun 21, 2017Updated 8 years ago
- ☆15Aug 13, 2019Updated 6 years ago
- Python library for grayhatwarfare.com with small hacks☆16Aug 5, 2020Updated 5 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago