Lists (29)
Sort Name ascending (A-Z)
Adware, Malware & Virus Tools
AI/ ChatGPT Awesome Lists
Awesome Github
Bug Bounty Hunter Plethora
ChatGPT
CyberSecurity Awesome Lists
CyberSecurity Developer List
CyberSecurity Plethora
Defensive Cyber Security
Exploit & Vuln Plethora
Free Course Computer Science
Free Course Cyber Security
Google Awesome Lists
Hacking
Hacking Tools Plethora
Hardware Plethora
Kali
Kali CyberSecurityKali Linux
Linux Forensics
M3U URL or Xtream Code
Magisk Modules
Movies/ TV
Notion
Offensive Cyber Security
Pen Testing Tools
Reverse Engineering Course
Torrents/ Torrentio
Web Dev & Self Hosting
Wordlist & Payload Plethora
- All languages
- Adblock Filter List
- Arduino
- Assembly
- Astro
- AutoIt
- Batchfile
- Boo
- C
- C#
- C++
- CSS
- Clojure
- CoffeeScript
- Coq
- Dart
- Dockerfile
- Eagle
- Elixir
- Emacs Lisp
- F#
- F*
- Go
- Groovy
- HTML
- Haskell
- Java
- JavaScript
- Jinja
- Julia
- Jupyter Notebook
- Kotlin
- LLVM
- Lua
- MATLAB
- MDX
- Makefile
- Markdown
- Mustache
- NewLisp
- Nunjucks
- OCaml
- Objective-C
- Objective-C++
- Open Policy Agent
- PHP
- Pascal
- Perl
- PowerShell
- Prolog
- Pug
- Python
- Rich Text Format
- Ruby
- Rust
- SCSS
- Scala
- Scilab
- Shell
- Smali
- Smarty
- Solidity
- Svelte
- Swift
- TeX
- TypeScript
- V
- VHDL
- Vala
- Vim Script
- Vue
- YARA
- Zig
Starred repositories
Small and highly portable detection tests based on MITRE's ATT&CK.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Android app for streaming and downloading media.
ZeroNet - Decentralized websites using Bitcoin crypto and BitTorrent network
This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
Automated Red Team Infrastructure deployement using Docker
🔱 Powerfull XSS Scanning and Parameter analysis tool&gem
Algorithmic, Data Structures, Frontend and Pentest - Programming challenges and competitions to improve knowledge.
K8Ladon大型内网渗透自定义插件化扫描神器,包含信息收集、网络资产、漏洞扫描、密码爆破、漏洞利用,程序采用多线程批量扫描大型内网多个IP段C段主机,目前插件包含: C段旁注扫描、子域名扫描、Ftp密码爆破、Mysql密码爆破、Oracle密码爆破、MSSQL密码爆破、Windows/Linux系统密码爆破、存活主机扫描、端口扫描、Web信息探测、操作系统版本探测、Cisco思科设备扫描等…
A curated list of awesome privilege escalation
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
A multifunctional Telegram based Android RAT without port forwarding.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Interactively find and recover deleted or 👉 overwritten 👈 files from your terminal
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes with a neat web app 🔥