💻
Hacking
Anything that can be used for good can be used for evil ⚡
Lists (32)
Sort Name ascending (A-Z)
Active Directory
11 repositories
AI Agents
23 repositories
AI and LLM
1 repository
AI Security
17 repositories
AI Social Engineering
1 repository
AI Tools
2 repositories
AV/EDR Bypass
2 repositories
Challenges
2 repositories
Cloud Pentest
GCP, AWS, AZURE2 repositories
CTI
3 repositories
CVE-POC
1 repository
DevOps
Open source devops tool alternative20 repositories
DevSecOps + Cloud Security
21 repositories
Email Solutions
2 repositories
General
4 repositories
gRPC
1 repository
Incident Response
1 repository
IOT Hacking
1 repository
Labs
2 repositories
Learning Resources
2 repositories
MCPs
1 repository
MSC
24 repositories
Pentest Projects
7 repositories
Post-Exploitation Tools
2 repositories
Programming
2 repositories
Python
1 repository
RATs and C2
6 repositories
Red Teaming Projects
4 repositories
SAST
1 repository
Secure Chatting
1 repository
Telecom
1 repository
Web Security
17 repositories
Stars
3
results
for sponsorable starred repositories
written in HTML
Clear filter
Data science interview questions and answers
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous …
Active Directory and Internal Pentest Cheatsheets