UticaCollegeCyberSecurityClub / Resources

Licence: other
No description or website provided.

Projects that are alternatives of or similar to Resources

Blackwidow
A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.
Stars: ✭ 887 (+2234.21%)
Mutual labels:  osint, scanner, xss, bugbounty
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+23534.21%)
Mutual labels:  osint, resources, sql-injection, bugbounty
Arachni
Web Application Security Scanner Framework
Stars: ✭ 2,942 (+7642.11%)
Mutual labels:  scanner, xss, sql-injection
Xspear
Powerfull XSS Scanning and Parameter analysis tool&gem
Stars: ✭ 583 (+1434.21%)
Mutual labels:  scanner, xss, bugbounty
Reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+2463.16%)
Mutual labels:  scanner, xss, bugbounty
Hackerone Reports
Top disclosed reports from HackerOne
Stars: ✭ 458 (+1105.26%)
Mutual labels:  xss, sql-injection, bugbounty
Dalfox
🌘🦊 DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang
Stars: ✭ 791 (+1981.58%)
Mutual labels:  scanner, xss, bugbounty
magicRecon
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+1157.89%)
Mutual labels:  scanner, sql-injection, bugbounty
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+4973.68%)
Mutual labels:  scanner, sql-injection, bugbounty
Dnstwist
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (+8121.05%)
Mutual labels:  osint, scanner, phishing
nuubi
Nuubi Tools (Information-ghatering|Scanner|Recon.)
Stars: ✭ 76 (+100%)
Mutual labels:  osint, scanner, bugbounty
Pythem
pentest framework
Stars: ✭ 1,060 (+2689.47%)
Mutual labels:  scanner, phishing, xss
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+8950%)
Mutual labels:  osint, scanner, bugbounty
flydns
Related subdomains finder
Stars: ✭ 29 (-23.68%)
Mutual labels:  osint, bugbounty
xssfinder
Toolset for detecting reflected xss in websites
Stars: ✭ 105 (+176.32%)
Mutual labels:  xss, bugbounty
aquatone
A Tool for Domain Flyovers
Stars: ✭ 43 (+13.16%)
Mutual labels:  osint, bugbounty
Jira-Lens
Fast and customizable vulnerability scanner For JIRA written in Python
Stars: ✭ 185 (+386.84%)
Mutual labels:  scanner, bugbounty
SourceWolf
Amazingly fast response crawler to find juicy stuff in the source code! 😎🔥
Stars: ✭ 132 (+247.37%)
Mutual labels:  osint, bugbounty
solutions-bwapp
In progress rough solutions to bWAPP / bee-box
Stars: ✭ 158 (+315.79%)
Mutual labels:  xss, sql-injection
hackable
A python flask app that is purposefully vulnerable to SQL injection and XSS attacks. To be used for demonstrating attacks
Stars: ✭ 61 (+60.53%)
Mutual labels:  xss, sql-injection

VMs

Mysql

Bash

SSRF

ravencoin

FTP

random-reports

core

html-smuggling

Red-teaming

machine-learning-and-hacking

ssrf

Networking

Fedora

Awesome List

search-engines

interview-cheatsheets

red-Team

blue team

PowerShell

Vulnerable VMs

Linux Guide

Kali Linux

Fuzzing

SSH

Deep Learning

Reverse_Engineering

Machine-Learning

Cheatsheets

Encryption & Cryptography

Apts

PHISHING TOOLS

OSINT

Windows SubSystem

MALWARE

Hardware

Cryptocurrency & Blockchains & Tokens

Offline wallet

Govt

Tor

BlockChain Analysis

Centos

Malware Samples

NOTE: The ones with * after the links are ones that are vetted. If you use your uc email and tell them your a cyber student, they wil mostly likely give you access.

Threat Maps

SCANNERS

WEB

Bug Bounty

NEWS SITES

XSS

SQL Injection Tools

SQL Injection

CSRF

Google Hacking

Python

Ruby

C++

Honey Pots

CTF

CTF Tools

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].