πΉ TCM Practical Ethical Hacking Resources - Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course.
πΉ Pen Testing Bible - About Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
πΉ CTF Wiki - A useful wiki containing CTF related topics
πΉ Hacker 101 - Source code for Hacker101.com - a free online web and mobile security class.
πΉ Hacking Security Ebooks - Top 100 Hacking & Security E-Books (Free Download)
πΉ The Practical Linux Hardening Guide - This guide details creating a secure Linux production system.
πΉ How to Secure Anything - How to systematically secure anything: a repository about security engineering.
πΉ OWASP-MSTG - The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.
πΉ Hacker Roadmap - π Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
πΉHack Tricks - Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
πΉ Sec Gen - Generate randomly insecure VMs
πΉ Movies For Hackers - π¬ A curated list of movies every hacker & cyberpunk must watch.
πΉ Caldera - Automated Adversary Emulation Platform
πΉ Awesome Shodan Queries - π A collection of interesting, funny, and depressing search queries to plug into shodan.io π©βπ»
πΉ Windows Hacks - Creative and unusual things that can be done with the Windows API.
πΉ Kickthemout - π€ Kick devices off your network by performing an ARP Spoof attack.
πΉ Juice Shop - OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
πΉ Kubernetes Goat - Kubernetes Goat π is a "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security π
πΉ Awesome CTF - A curated list of CTF frameworks, libraries, resources and softwares.
πΉ Awesome Hacking - A collection of various awesome lists for hackers, pentesters and security researchers
πΉ Awesome OSINT - π± A curated list of amazingly awesome OSINT
πΉ Awesome Mobile Security - An effort to build a single place for all useful android and iOS security related stuff.
πΉ The Book of Secret Knowledge - A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
πΉ Cheatsheet God - Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
πΉ WebHackerWeapons - βοΈ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
πΉ Social Analyzer - API, CLI & Web App for analyzing & finding a person's profile across 400+ social media.
πΉ Git Graber - GitHub to search and find sensitive data in real time for different online services..
πΉ SpiderFoot - SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
πΉ Osintgram - Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
πΉ ShodanTools - Collection of scripts & fingerprinting tricks for Shodan.io
πΉ Github Dorks - Find leaked secrets via github search
πΉ Gitjacker - πͺ
Leak git repositories from misconfigured websites
πΉ Reconnoitre - A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
πΉ reconFTW - reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
πΉ Payloads All Things - A list of useful payloads and bypass for Web Application Security and Pentest/CTF.
πΉ TheFatRat - Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac
πΉ Bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
πΉ BruteShark - Network Analysis Tool
πΉ Ciphey - β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘
πΉ Stegcloak - Hide secrets with invisible characters in plain text securely using passwords π§π»ββοΈβ
πΉ ATSCAN - Advanced dork Search & Mass Exploit Scanner.
πΉ WhatWeb - Next generation web scanner
πΉ Raccoon - A high performance offensive security tool for reconnaissance and vulnerability scanning
πΉ Evil Winrm - The ultimate WinRM shell for hacking/pentesting
πΉ Ghost - Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
πΉ HackDroid - Pentesting Using Android
πΉ FireCracker - Firecrack pentest tools: Facebook hacking random attack, deface, admin finder, bing dorking
πΉ DDoS-Ripper - DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Internet traffic
πΉ Bombardier - bombardier
πΉ MHDDos - Best DDoS Attack Script Python3, Cyber Attack With 40 Methods
πΉ UFONet - UFONet - Denial of Service Toolkit