A curated list of hacking environments where you can train your cyber skills legally and safely
☆38Jul 4, 2018Updated 7 years ago
Alternatives and similar repositories for awesome-cyber-skills
Users that are interested in awesome-cyber-skills are comparing it to the libraries listed below
Sorting:
- This repository is a mirror of https://git.openwrt.org/openwrt/openwrt.git It is for reference only and is not active for check-ins or fo…☆21Apr 27, 2021Updated 4 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Sep 5, 2018Updated 7 years ago
- ☆29Feb 16, 2022Updated 4 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Mar 4, 2020Updated 6 years ago
- ☆28Sep 16, 2020Updated 5 years ago
- Simple Shellcode development/injection on macOS☆11Nov 6, 2017Updated 8 years ago
- CTF (Capture The Flag) writeups, code snippets, scripts☆16Oct 18, 2018Updated 7 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆15May 29, 2020Updated 5 years ago
- ABANDONED: Convert a few types of Objective-C objects (see the readme) to and from XPC objects.☆29Jan 12, 2012Updated 14 years ago
- Tunnel IP over ICMP.☆16Jul 13, 2016Updated 9 years ago
- Needed a way to filter all my pwnagotchi handshakes.☆13Feb 8, 2020Updated 6 years ago
- ☆11Jan 11, 2026Updated 2 months ago
- ElasticSearch vulnerable scanner☆16Oct 6, 2019Updated 6 years ago
- ☆15May 3, 2024Updated last year
- ☆18May 3, 2021Updated 4 years ago
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- Tips and tricks on reversing and exploiting Windows using free and easy to get tools.☆33Mar 21, 2023Updated 3 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- mdbook preprocessor for generating checklists and indexes☆14Nov 29, 2022Updated 3 years ago
- macOS application that makes use of the EndpointSecurity framework☆19Aug 1, 2019Updated 6 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- ☆32Mar 11, 2026Updated last week
- Digispark Overmaster free IDE TOOL allows to create and edit Digispark Scripts by the drag and drop technique,with cool GUI and easy to u…☆13Mar 5, 2023Updated 3 years ago
- A powerful Burp extension to make bounty rain☆14Feb 1, 2022Updated 4 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- ☆11Aug 18, 2023Updated 2 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- A PowerShell module for tracking where you spend your time. Use the commands in this module to track how much time you are spending on di…☆26Jun 28, 2023Updated 2 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆74Dec 4, 2019Updated 6 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Combines the speed of masscan with the reliability and detailed enumeration of nmap☆17Aug 16, 2017Updated 8 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- A centralized location for all presentations I've given at various conferences☆26Sep 1, 2017Updated 8 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 6 months ago
- Python3 HTTP Server with upload functionality☆21Dec 4, 2023Updated 2 years ago