th3cyb3rhub / 100-hacking-toolsLinks
100 Hacking Tools and Resources
โ109Updated 2 years ago
Alternatives and similar repositories for 100-hacking-tools
Users that are interested in 100-hacking-tools are comparing it to the libraries listed below
Sorting:
- OSCP Cheatsheet by Sai Sathvikโ70Updated last year
- ๐ฅท SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, etโฆโ175Updated this week
- โ101Updated last month
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.โ218Updated 6 months ago
- cyber security mind maps collectionโ218Updated last year
- Complete Roadmap for Penetration Testingโ234Updated 10 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making iโฆโ114Updated last month
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.โ380Updated last week
- A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure codโฆโ276Updated last week
- ๐๐ผ๐บ๐ฝ๐น๐ฒ๐๐ฒ ๐๐๐ด ๐๐ผ๐๐ป๐๐ ๐ฅ๐ผ๐ฎ๐ฑ๐บ๐ฎ๐ฝ ๐ฏโ84Updated 4 months ago
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.๐ค๐ป๐โ206Updated last year
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as APIโฆโ38Updated 7 months ago
- โ119Updated 7 months ago
- My notes while studying for the PNPT from TCM Security.โ77Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatioโฆโ158Updated 2 months ago
- ๐ LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.โ53Updated 6 months ago
- A curated list of OSINT tools for company research, internet scanning, DNS, and Whois lookups, organized for easy access. Ideal for analyโฆโ188Updated 10 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.โ72Updated 5 months ago
- Chrome Extensions for OSINTโ77Updated 3 weeks ago
- A curated list of free cybersecurity learning resources.โ132Updated 10 months ago
- Python for AWAE (Advanced Web Attacks and Exploitation)โ96Updated last year
- An auto-updating list of shodan dorks with info on the amount of results they return!โ233Updated this week
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offeโฆโ139Updated 4 months ago
- This repository is a curated resource for aspiring bug hunters, offering hands-on labs, tools, and structured guidance to support your leโฆโ56Updated last month
- A New Approach to Directory Bruteforce with WaybackLister v1.0โ189Updated 3 weeks ago
- This tool can retrieve : 1.Deleted tweets and replies ,Even if The account is suspended 2 .Old bios and Timestamp of The tweetsโ238Updated last year
- AdamsScan is an automated subdomain enumeration script that utilizes multiple popular tools and APIs like Sublist3r, Amass, Subfinder, crโฆโ25Updated 4 months ago
- 100-Days-of-Hackingโ131Updated last year
- How to Crack an Entry Level Job in Cybersecurity! - 2024โ21Updated last year
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based tโฆโ128Updated 6 months ago