A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
-
Updated
Jul 20, 2022
{{ message }}
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
A collection of various awesome lists for hackers, pentesters and security researchers
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
ALL IN ONE Hacking Tool For Hackers
Source code for Hacker101.com - a free online web and mobile security class.
A collection of hacking / penetration testing resources to make you better!
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat
A collection of hacking tools, resources and references to practice ethical hacking.
The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
This is more of a question with a potential follow-up suggestion: in the genre column, we do have drama/thriller and thriller/drama
Is there a valid reason behind this? If not, I would suggest making it more consistent (eg: pick one between the two and use it consistently across the list), so that sorting it properly groups them.
Also: since we do have categories already, why the column
A common protocol structure is to have a header containing a length field, followed by data of length bytes, followed by additional protocol fields such as a CRC. If the length field is variable, the position of subsequent URH-specified protocol fields defined by fixed position will not be in the correct location.
I do not know the best way to address this, but quick and easy way to support
Web path scanner
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
A list of resources for those interested in getting started in bug bounties
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
It has been a pleasure for me to contribute to all of you 2 versions of this tool.
I've been working on other open source projects that I'm about to release for you, so I haven't finished trape version 3.0.
But, I invite you and the entire community that has used this project, to collaborate with some lines of code, implementing your own ideas and improving trape, turning it into a project o
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
RustScan has an accessible mode, rustscan --accessible which should promise not to have any weird ASCII text in it.
Write CI that runs RustScan with --accessible a few times, with different flags / options and check the terminal output to see if it contains one of these:
[!][~][>]| {}If any of these characters appear in any of the tests, fail the CI. E
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing.
Matched on: ::
Name: Internet Protocol (IP) Address Version 6
Link: https://www.shodan.io/host/::
This shouldn't match.
Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。
Add a description, image, and links to the hacking topic page so that developers can more easily learn about it.
To associate your repository with the hacking topic, visit your repo's landing page and select "manage topics."
Hey Hackers of this spoopy month!👻
Welcome to the Ciphey repo(s)!
This issue requires you to add a decoder.
This wiki section walks you through EVERYTHING you need to know, and we've added some more links at the bottom of this issue to detail more about the decoder.
https://github.com/Ciphey/Ciphey/wiki#adding-your-own-crackers--decoders
https://www.dcode.fr/t9-cipher
https://en.wikipe