A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
-
Updated
Oct 2, 2021
{{ message }}
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
A collection of various awesome lists for hackers, pentesters and security researchers
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Source code for Hacker101.com - a free online web and mobile security class.
A collection of hacking / penetration testing resources to make you better!
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Hello spoooopyyy hackers
This is a Hacktoberfest only issue!
This is also data-sciency!
Our English dictionary contains words that aren't English, and does not contain common English words.
Examples of non-common words in the dictionary:
"hlithskjalf",
"hlorrithi",
"hlqn",
"hm",
"hny",
"ho",
"hoactzin",
"hoactzine
App Attest allows your app to attach a hardware-backed assertion as a part of the request. Your server can use assertion to verify the request came from your genuine app, on a genuine Apple device.
https://developer.apple.com/videos/play/wwdc2021/10244/
https://developer.apple.com/documentation/devicecheck/assessing_fraud_risk
https://developer.apple.com/documentation/bundleresources/entit
A common protocol structure is to have a header containing a length field, followed by data of length bytes, followed by additional protocol fields such as a CRC. If the length field is variable, the position of subsequent URH-specified protocol fields defined by fixed position will not be in the correct location.
I do not know the best way to address this, but quick and easy way to support
ALL IN ONE Hacking Tool For Hackers
A list of resources for those interested in getting started in bug bounties
Web path scanner
It has been a pleasure for me to contribute to all of you 2 versions of this tool.
I've been working on other open source projects that I'm about to release for you, so I haven't finished trape version 3.0.
But, I invite you and the entire community that has used this project, to collaborate with some lines of code, implementing your own ideas and improving trape, turning it into a project o
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Several users originally missing security question answers - most notably bjoern.k
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
RustScan has an accessible mode, rustscan --accessible which should promise not to have any weird ASCII text in it.
Write CI that runs RustScan with --accessible a few times, with different flags / options and check the terminal output to see if it contains one of these:
[!][~][>]| {}If any of these characters appear in any of the tests, fail the CI. E
Sshgit has a bunch of regex we can use :)
https://github.com/eth0izzle/shhgit/blob/master/config.yaml
Follow our contributing guide here:
https://github.com/bee-san/pyWhat/wiki/Adding-your-own-Regex
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Add a description, image, and links to the hacking topic page so that developers can more easily learn about it.
To associate your repository with the hacking topic, visit your repo's landing page and select "manage topics."
This is more of a question with a potential follow-up suggestion: in the genre column, we do have
drama/thrillerandthriller/dramaIs there a valid reason behind this? If not, I would suggest making it more consistent (eg: pick one between the two and use it consistently across the list), so that sorting it properly groups them.
Also: since we do have categories already, why the column