Highlights
- Pro
Lists (2)
Sort Name ascending (A-Z)
Stars
A collection of reverse engineering challenges for learning about the Android operating system and mobile security.
List of CyberSecurity Resources and some different Sub-Domains of CyberSecurity
OWASP Web Application Security Testing Checklist
The most unusual OSINT guide you've ever seen. The repository is intended for bored professionals only. PRs are welcome!
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), ar…
DefroxPot is a honeypot project designed to detect, monitor, and analyze malicious activity in a controlled environment. This project aims to provide cybersecurity enthusiasts and professionals wit…
Git commit message: how to write a great git commit message and commit template for version control
Master programming by recreating your favorite technologies from scratch.
A Golang blocking rate limit implementation
proxy-me is a tool to grab or scrape proxies across internet under specific protocols, It is a lightweight project that hourly scrapes lots of free-proxy, FREE proxies. Supported platforms: Windows…
A list of resources for those interested in getting started in bug bounties
My OSCP Pre-Preparation Phase. I'm not sure if I'll be able to afford the exam but what count's trying and learning things. I'm gonna give it a try. [Start Date: 21st March 2022]
An insane list of all dorks taken from everywhere from various different sources.
Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against malicious threats. Let's delve into the tasks and functions tha…
Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.
latest version of scanners for IIS short filename (8.3) disclosure vulnerability
Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
A small collection of vulnerable code snippets
OSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.
Welcome Hackers, this is your go-to resource for learning cybersecurity stuff everyday :)
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, si…