A collection of various awesome lists for hackers, pentesters and security researchers
-
Updated
Oct 4, 2020
{{ message }}
A collection of various awesome lists for hackers, pentesters and security researchers
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Source code for Hacker101.com - a free online web and mobile security class.
A collection of hacking / penetration testing resources to make you better!
Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat
The Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and MITM attacks.
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
Add 8.7 and 8.8 for android and ios: show how you can delay the attacker or report tampering to the backend as a response to a tamper detected
8.7: The app implements multiple mechanisms in each defense category (8.1 to 8.6). Note that resiliency scales with the amount, diversity of the originality of the mechanisms used.
8.8: The detection mechanisms trigger responses of different types, includ
A common protocol structure is to have a header containing a length field, followed by data of length bytes, followed by additional protocol fields such as a CRC. If the length field is variable, the position of subsequent URH-specified protocol fields defined by fixed position will not be in the correct location.
I do not know the best way to address this, but quick and easy way to support
It has been a pleasure for me to contribute to all of you 2 versions of this tool.
I've been working on other open source projects that I'm about to release for you, so I haven't finished trape version 3.0.
But, I invite you and the entire community that has used this project, to collaborate with some lines of code, implementing your own ideas and improving trape, turning it into a project o
ALL IN ONE Hacking Tool For Hackers
Hello spoooopyyy hackers
This is a Hacktoberfest only issue!
Find our contributing guidelines here, this walks you through how to add a decoder / cracker!
https://github.com/Ciphey/Ciphey/wiki#adding-your-own-crackers--decoders
Don't worry if it looks hard, we will walk you through everything! :)
Write this issue in Python!
These links will
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
Web path scanner
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
A collection of open source and commercial tools that aid in red team operations.
Automated pentest framework for offensive security experts
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
A list of resources for those interested in getting started in bug bounties
Decrypted content of eqgrp-auction-file.tar.xz
Patch iOS Apps, The Easy Way, Without Jailbreak.
An Information Security Reference That Doesn't Suck
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Add a description, image, and links to the hacking topic page so that developers can more easily learn about it.
To associate your repository with the hacking topic, visit your repo's landing page and select "manage topics."
This is more of a question with a potential follow-up suggestion: in the genre column, we do have
drama/thrillerandthriller/dramaIs there a valid reason behind this? If not, I would suggest making it more consistent (eg: pick one between the two and use it consistently across the list), so that sorting it properly groups them.
Also: since we do have categories already, why the column