Hacking (〜 ̄▽ ̄)〜
Cybersecurity Professional in the making.
English | Spanish
- Jujuy, Argentina
Lists (18)
Sort Name ascending (A-Z)
📱 Android
8 repositories
⚔️ APT
1 repository
🔍 AV-Bypass
4 repositories
🔵 Blue Team
19 repositories
📝Code Analyzers
Static & dynamic analysis2 repositories
Core Programs
Really handy stuff I install on all computers4 repositories
🧷 Cracking
1 repository
💥 Denial of Service
1 repository
🍖 Exploitation
15 repositories
🚨 Forensics
3 repositories
🍯 Honey Pots
3 repositories
🔧 Miscelanous Tools
17 repositories
🧐 OSINT
6 repositories
🪝 Phising
2 repositories
🦴 Post-Exploitation
12 repositories
👁️ Recon
18 repositories
⚙️ Reverse Engineering
3 repositories
🔨 Software Development
3 repositories
Stars
3
stars
written in Dockerfile
Clear filter
Pre-Built Vulnerable Environments Based on Docker-Compose
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.