A collection of hacking / penetration testing resources to make you better!
☆71Aug 17, 2018Updated 7 years ago
Alternatives and similar repositories for Awesome-Hacking-Resources
Users that are interested in Awesome-Hacking-Resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Wiki to collect Red Team infrastructure hardening resources☆32Sep 1, 2018Updated 7 years ago
- Git All the Payloads! A collection of web attack payloads.☆10Dec 31, 2018Updated 7 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆13May 18, 2018Updated 7 years ago
- CEHv9 - Practice Exam Questions with Answers☆69May 22, 2018Updated 7 years ago
- Top 20 Kali Linux Related E-books (Free Download)☆326Jul 26, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Top 100 Hacking & Security E-Books (Free Download)☆6,332Jul 26, 2024Updated last year
- Material i gathered for the Offensive Security Certified Professional OSCP☆14Jan 15, 2019Updated 7 years ago
- ☆11Jan 9, 2019Updated 7 years ago
- ☆12May 20, 2016Updated 9 years ago
- ☆40Sep 11, 2019Updated 6 years ago
- An example project showing Kafka with Spring Boot☆13May 21, 2018Updated 7 years ago
- A well organised book on 'Python Programming Language' written in bengali specially for beginners and intermediate learners.☆12Jun 28, 2021Updated 4 years ago
- A collection of payloads for different vulnerabilities, best payload lists in one repository☆17Jul 28, 2021Updated 4 years ago
- ☆11Feb 17, 2019Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆23Jan 1, 2023Updated 3 years ago
- Tools for working with visual novels☆30Jan 25, 2026Updated 3 months ago
- PDF Manipulation Tools with Python Built in the Practical Python PDF Processing EBook☆18Sep 15, 2023Updated 2 years ago
- Starting to know some basic bash scripting and also writing bash scripts that does some basic shell task.☆12Jun 6, 2023Updated 2 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 9 years ago
- System programming & Algorithm ― Linux programming☆14Feb 22, 2018Updated 8 years ago
- CompTIA Linux 2021☆11Feb 15, 2021Updated 5 years ago
- Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition, published by Packt☆28Jan 18, 2023Updated 3 years ago
- A repo for my CCN Coding Club talk, 'Python, Rust, and You: Modern Py-Rust Interoperation'☆44Aug 12, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- penetration testing ebooks for free☆13Nov 4, 2019Updated 6 years ago
- Install kali nethunter☆24Sep 10, 2020Updated 5 years ago
- ☆11Jan 28, 2017Updated 9 years ago
- Writing executable lines of code☆12Nov 24, 2022Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆79Dec 24, 2025Updated 4 months ago
- Mind Maps for penetration testing☆22Feb 4, 2021Updated 5 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- ☆12Jun 10, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- Get files from Android directories☆11Dec 9, 2018Updated 7 years ago
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆17Nov 11, 2016Updated 9 years ago
- My Squid 3 configuration to survive 50 kByte/s down link.☆21Feb 28, 2015Updated 11 years ago
- Hack method to download all of your media from tadpoles.com☆17Mar 8, 2023Updated 3 years ago
- A list of telco security resources and projects.☆13Feb 22, 2020Updated 6 years ago
- This report was written for the Digital Forensics Analysis coursework, specifically the first assignment. In which, steps and screenshots…☆13Jul 17, 2023Updated 2 years ago