💻
Hacking
Anything that can be used for good can be used for evil ⚡
Lists (32)
Sort Name ascending (A-Z)
Active Directory
11 repositories
AI Agents
12 repositories
AI and LLM
1 repository
AI Security
15 repositories
AI Social Engineering
1 repository
AI Tools
1 repository
AV/EDR Bypass
2 repositories
Challenges
2 repositories
Cloud Pentest
GCP, AWS, AZURE2 repositories
CTI
3 repositories
CVE-POC
1 repository
DevOps
Open source devops tool alternative13 repositories
DevSecOps + Cloud Security
19 repositories
Email Solutions
2 repositories
General
4 repositories
gRPC
1 repository
Incident Response
1 repository
IOT Hacking
1 repository
Labs
2 repositories
Learning Resources
2 repositories
MCPs
1 repository
MSC
13 repositories
Pentest Projects
7 repositories
Post-Exploitation Tools
1 repository
Programming
2 repositories
Python
1 repository
RATs and C2
6 repositories
Red Teaming Projects
4 repositories
SAST
1 repository
Secure Chatting
1 repository
Telecom
1 repository
Web Security
13 repositories
Stars
2
stars
written in Dockerfile
Clear filter
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
An intentionally vulnerable NGINX setup