A collection of various awesome lists for hackers, pentesters and security researchers. With repository stars⭐ and forks🍴
-
Updated
Jun 12, 2024
Hacking refers to the practice of gaining unauthorized access to data in a system or computer. This topic encompasses various forms of hacking, including black-hat and grey-hat hacking, which involve malicious or non-malicious intent. It explores the tools and techniques used by hackers, the motivations behind hacking, and the measures organizations can take to protect themselves.
A collection of various awesome lists for hackers, pentesters and security researchers. With repository stars⭐ and forks🍴
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. With repository stars⭐ and forks🍴
Projeto simples para grepar valores usando uma lista como base
BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python-based tool leverages Selenium and Selenium-Wire to automate web form fuzzing, making it easier to identify potential vulnerabilities in web applications.
API tests de seguridad para identificar vulnerabilidades ( hackingyseguridad.com )
An auto-updating list of shodan dorks with info on the amount of results they return!
Get PROXY List that gets updated everyday
Update free every 2 hours
Hourly updated database of exploit and exploitation reports
Web Based Free and Open Source Passive and Active Reconnaissance Framework written in Python
This repository is dedicated to showcasing a collection of educational videos curated with gratitude for Defronix and my mentor Mr. Nitesh Singh. The content available here features a series of insightful tutorials and discussions on various topics related to cybersecurity.
A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers
Spirit - Network Pentest Tools
DrXploit is a powerful and open-source penetration testing and exploitation tool for web applications. This tool is designed to automate the process of discovering and exploiting vulnerabilities, saving time and effort for security researchers.
Config files for my GitHub profile.