Ghost👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (-6.31%)
AWS-SAP-C01-Study-GuideThis repository is used to help readers pass the AWS Certified Solutions Architect Professional Exam
Stars: ✭ 50 (-84.98%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+951.95%)
spring-web-cert-notes-4.2Study notes for Pivotal Certified Spring Web Application Developer Certification - v 4.2
Stars: ✭ 36 (-89.19%)
PivotsuiteNetwork Pivoting Toolkit
Stars: ✭ 329 (-1.2%)
Coursera-CertificationsA repository to showcase my completed courses on the Coursera platform.
Stars: ✭ 20 (-93.99%)
dca-prep-kitPreparation notes and tips & tricks for cloud an IT certifications
Stars: ✭ 41 (-87.69%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+1630.63%)
gnome-keysignAn easier way to sign OpenPGP keys over the local network. A GTK/GNOME application to use GnuPG for signing other peoples' keys. Quickly, easily, and securely.
Stars: ✭ 42 (-87.39%)
Vps个人笔记汇总
Stars: ✭ 276 (-17.12%)
Awesome Sec TalksA collected list of awesome security talks
Stars: ✭ 3,411 (+924.32%)
save-cloudCluster-based cloud mechanism for running SAVE framework
Stars: ✭ 30 (-90.99%)
Kubernetes Certified AdministratorOnline resources that will help you prepare for taking the CNCF CKA 2020 "Kubernetes Certified Administrator" Certification exam. with time, This is not likely the comprehensive up to date list - please make a pull request if there something that should be added here.
Stars: ✭ 3,438 (+932.43%)
FreecodecampfreeCodeCamp.org's open-source codebase and curriculum. Learn to code for free.
Stars: ✭ 339,510 (+101854.95%)
Langhost👻 A LAN dropbox chatbot controllable via Telegram
Stars: ✭ 324 (-2.7%)
Symfony PackA series of questions to prepare for the Symfony certification
Stars: ✭ 241 (-27.63%)
BopscrkTool to generate smart and powerful wordlists
Stars: ✭ 273 (-18.02%)
QuackQuack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools.
Stars: ✭ 305 (-8.41%)
DoorstopRequirements management using version control.
Stars: ✭ 258 (-22.52%)
CtfCTF (Capture The Flag) writeups, code snippets, notes, scripts
Stars: ✭ 336 (+0.9%)
D8 StudyguideStudy guide for the Acquia Certified Drupal 8 Developer, Backend and Frontend Exams.
Stars: ✭ 271 (-18.62%)
Learning CloudList of resources - courses, sample code, articles and screencasts for learning AWS, Azure, GCP and Alibaba Cloud
Stars: ✭ 100 (-69.97%)
LambdaguardAWS Serverless Security
Stars: ✭ 300 (-9.91%)
Lpic 1 Anki FlashcardsDeck of Anki flashcards for the LPIC-1 (Linux System Administrator) exams 101 and 102 of the Linux Professional Institute (LPI).
Stars: ✭ 90 (-72.97%)
BlacknetFree advanced and modern Windows botnet with a nice and secure PHP panel.
Stars: ✭ 271 (-18.62%)
AirgeddonThis is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+1050.15%)
Dca Prep GuideDocker Certification Associate preparation guide - a list of resources to help you prepare for a successful certification
Stars: ✭ 739 (+121.92%)
Domain hunterA Burp Suite Extension that try to find all sub-domain, similar-domain and related-domain of an organization automatically! 基于流量自动收集整个企业或组织的子域名、相似域名、相关域名的burp插件
Stars: ✭ 594 (+78.38%)
Gta ReversedReversed code of GTA:SA executable (gta_sa.exe) 1.0 US
Stars: ✭ 297 (-10.81%)
Ckad ExercisesA set of exercises to prepare for Certified Kubernetes Application Developer exam by Cloud Native Computing Foundation
Stars: ✭ 5,247 (+1475.68%)
Soup☎️ Original open source call flooder using Twilio's API.
Stars: ✭ 267 (-19.82%)
RspetRSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (-24.62%)
BillcipherInformation Gathering tool for a Website or IP address
Stars: ✭ 332 (-0.3%)
KalimuxInstall And Use Kali Linux With Gui In Termux
Stars: ✭ 240 (-27.93%)
Jenkins Rce😈 Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!
Stars: ✭ 262 (-21.32%)
ThechoiceThe linux choice collection tools
Stars: ✭ 245 (-26.43%)
Windows Post ExploitationWindows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (-11.11%)
Icg AutoexploiterbotWordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Stars: ✭ 242 (-27.33%)
DeckerDeclarative penetration testing orchestration framework
Stars: ✭ 263 (-21.02%)
Juice Shop CtfCapture-the-Flag (CTF) environment setup tools for OWASP Juice Shop
Stars: ✭ 238 (-28.53%)
OsintgramOsintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (-6.31%)
UptuxLinux privilege escalation checks (systemd, dbus, socket fun, etc)
Stars: ✭ 260 (-21.92%)
Ctf DifficultyThis cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
Stars: ✭ 338 (+1.5%)
Socialbox TermuxSocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By init__0 for termux on android
Stars: ✭ 324 (-2.7%)
Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-1.5%)
Android ExploitsA collection of android Exploits and Hacks
Stars: ✭ 290 (-12.91%)
Lyncsmashlocate and attack Lync/Skype for Business
Stars: ✭ 258 (-22.52%)