CyberQueensCyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨💻
Stars: ✭ 30 (+114.29%)
Hack Movie黑客相关的电视剧/电影/纪录片
Stars: ✭ 199 (+1321.43%)
CEHExam Prep for the Ec-council Certified Ethical Hacker 312-50
Stars: ✭ 71 (+407.14%)
AhridAHRID - Analysis Hacker's Real-ID Platform 黑客攻击画像分析系统(停止运营)
Stars: ✭ 133 (+850%)
Ecommerce Website Security ChecklistList of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built into the Techinical Specific Document, or will be checked in the Security testing phases.
Stars: ✭ 98 (+600%)
Aliens eyeSocial media hunter
Stars: ✭ 105 (+650%)
Awesome Hacking ListsProject transferred to: https://github.com/taielab/awesome-hacking-lists
Stars: ✭ 203 (+1350%)
DracnmapDracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+6050%)
mystars精选了千余项目,包括机器学习、深度学习、NLP、GNN、推荐系统、生物医药、机器视觉等内容。
Stars: ✭ 112 (+700%)
Hack ToolsThe all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+19542.86%)
hacking-resourcesHacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
Stars: ✭ 1,386 (+9800%)
Oxidtools200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (+921.43%)
foss-eventsA simple website with a collection of open-source events happening across the globe. This is a beginner-friendly repository that helps you learn git and contribute to web projects. Happy Hacktober!
Stars: ✭ 123 (+778.57%)
phomberPhomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (+321.43%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+74550%)
XessMy minimal Gruvbox CSS file I've been keeping multiple places
Stars: ✭ 144 (+928.57%)
WhitehatInformation about my experiences on ethical hacking 💀
Stars: ✭ 54 (+285.71%)
Icg AutoexploiterbotWordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Stars: ✭ 242 (+1628.57%)
Hacker News PwasHNPWA - Hacker News readers as Progressive Web Apps 📱
Stars: ✭ 2,345 (+16650%)
Spy-QuizHacker Challenge 👾
Stars: ✭ 17 (+21.43%)
Zbn安全编排与自动化响应平台
Stars: ✭ 201 (+1335.71%)
singlefilefeatured cs:go internal hack, one file and less than 1000 lines.
Stars: ✭ 47 (+235.71%)
MouseMouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+1228.57%)
CyberPunkNetrunnerCyberpunk 2077 Netrunner Hacking Tool (Easy to use and install). Don't use it on illegal and malicious activity. Inspired by the game CyberPunk 2077 https://www.cyberpunk.net/
Stars: ✭ 69 (+392.86%)
Cehv10 Notes📕 Both personal and public notes for EC-Council's CEHv10 312-50, because its thousands of pages/slides of boredom, and a braindump to many
Stars: ✭ 170 (+1114.29%)
owtUpdate Version 3.1 added free SMS messaging.
Stars: ✭ 339 (+2321.43%)
HackercampEnine boyuna siber güvenlik
Stars: ✭ 149 (+964.29%)
mec-ngpentest toolbox
Stars: ✭ 28 (+100%)
Penetration渗透 超全面的渗透资料💯 包含:0day,xss,sql注入,提权……
Stars: ✭ 1,706 (+12085.71%)
transwinMake window/frame transparent.
Stars: ✭ 22 (+57.14%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (+800%)
Blackeye-for-WindowsThis is a Phishing tool. Phishing is a type of hacking also called credential harvesting. It creates fake websites for victims to login which saves their login info which includes IP, User-Agent, Username and Password to a file in the computer running Blackeye. This tool has been there for Linux and even Android via Termux. I converted it to Win…
Stars: ✭ 38 (+171.43%)
M3m0M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (+785.71%)
Collection DocumentCollection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+9807.14%)
Osint SanFramework для сбора данных из открытых источников. В Framework используется большое количество API, их необходимо зарегистрировать самому.
Stars: ✭ 99 (+607.14%)
DecoyMini🐝 A highly scalable, safe, free enterprise honeypots 一款高可扩展、安全、免费的企业级蜜罐系统
Stars: ✭ 213 (+1421.43%)
Netuser使用windows api添加用户,可用于net无法使用时
Stars: ✭ 95 (+578.57%)
super-hackerSuperHacker is the ultimate utility to make you look like a hacker.
Stars: ✭ 50 (+257.14%)
BlackwormBlack Worm Offical Repo
Stars: ✭ 80 (+471.43%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (+414.29%)
ThechoiceThe linux choice collection tools
Stars: ✭ 245 (+1650%)
Minion Ciminimalist, decentralized, flexible Continuous Integration Server for hackers.
Stars: ✭ 44 (+214.29%)
PhoniaPhonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with a very good accuracy.
Stars: ✭ 221 (+1478.57%)
Gmail-HackGmail account using brute force attack
Stars: ✭ 69 (+392.86%)
BruteSploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 26 (+85.71%)
Hackers Tool KitIts a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram
Stars: ✭ 211 (+1407.14%)