th3cyb3rhub / 100-hacking-toolsLinks
100 Hacking Tools and Resources
☆108Updated 2 years ago
Alternatives and similar repositories for 100-hacking-tools
Users that are interested in 100-hacking-tools are comparing it to the libraries listed below
Sorting:
- OSCP Cheatsheet by Sai Sathvik☆70Updated last year
- My notes while studying for the PNPT from TCM Security.☆76Updated last year
- 𝗖𝗼𝗺𝗽𝗹𝗲𝘁𝗲 𝗕𝘂𝗴 𝗕𝗼𝘂𝗻𝘁𝘆 𝗥𝗼𝗮𝗱𝗺𝗮𝗽 🎯☆84Updated 4 months ago
- Complete Roadmap for Penetration Testing☆227Updated 9 months ago
- A deliberately vulnerable banking application designed for practicing secure code reviews and API security testing. Features common vulne…☆230Updated 3 weeks ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆215Updated 6 months ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 6 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆71Updated 5 months ago
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.🤞🏻😌☆205Updated last year
- ☆96Updated 3 weeks ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆139Updated last month
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 6 months ago
- ☆47Updated 3 weeks ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆104Updated last week
- Python for AWAE (Advanced Web Attacks and Exploitation)☆95Updated last year
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a var…☆42Updated 3 weeks ago
- AdamsScan is an automated subdomain enumeration script that utilizes multiple popular tools and APIs like Sublist3r, Amass, Subfinder, cr…☆25Updated 3 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆316Updated last week
- cyber security mind maps collection☆217Updated last year
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆253Updated this week
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 9 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆139Updated 3 months ago
- How to Crack an Entry Level Job in Cybersecurity! - 2024☆21Updated last year
- An interactive Bash-based network scanning tool that provides live host discovery, port scanning, traceroute, and ping tests, featuring v…☆37Updated 2 months ago
- A curated list of OSINT tools for company research, internet scanning, DNS, and Whois lookups, organized for easy access. Ideal for analy…☆187Updated 9 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆179Updated 2 weeks ago
- ☆52Updated last year
- ☆37Updated 2 months ago
- Minimalist notes for CEH-practical Cert.☆35Updated 2 years ago
- Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing…☆303Updated last year