th3cyb3rhub / 100-hacking-toolsLinks
100 Hacking Tools and Resources
☆110Updated 2 years ago
Alternatives and similar repositories for 100-hacking-tools
Users that are interested in 100-hacking-tools are comparing it to the libraries listed below
Sorting:
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆55Updated 8 months ago
- 🥷 SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, et…☆311Updated last month
- ☆142Updated 6 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆226Updated 8 months ago
- Learn how to conduct advanced searching of the World Wide Web☆280Updated 4 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆153Updated 3 weeks ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆95Updated 8 months ago
- OSCP Cheatsheet by Sai Sathvik☆80Updated 2 years ago
- A user-friendly Python toolkit for open source intelligence, providing key features such as image geolocation, social media profiling, em…☆189Updated 3 months ago
- ☆120Updated 11 months ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆44Updated 8 months ago
- ☆244Updated 2 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆258Updated 11 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆54Updated 11 months ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated last year
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.🤞🏻😌☆212Updated 2 years ago
- cyber security mind maps collection☆223Updated last year
- Complete Roadmap for Penetration Testing☆251Updated last year
- My notes while studying for the PNPT from TCM Security.☆82Updated last year
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆55Updated 11 months ago
- This repository is a curated resource for aspiring bug hunters, offering hands-on labs, tools, and structured guidance to support your le…☆62Updated 5 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆160Updated 8 months ago
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆50Updated 8 months ago
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆18Updated 7 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆210Updated 2 months ago
- A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure cod…☆479Updated 2 weeks ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆571Updated last week
- An auto-updating list of shodan dorks with info on the amount of results they return!☆299Updated this week
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a var…☆47Updated 6 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆214Updated 3 months ago