A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers
-
Updated
May 29, 2024 - JavaScript
A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers
UAC bypass, Elevate, Persistence methods
A large number of free HTTP proxies updated every 10 minutes.Keep http/s proxies fresh at all times.
An auto-updating list of shodan dorks with info on the amount of results they return!
Hourly updated database of exploit and exploitation reports
Update free every 2 hours
Asset inventory of over 800 public bug bounty programs.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
This repository is dedicated to showcasing a collection of educational videos curated with gratitude for Defronix and my mentor Mr. Nitesh Singh. The content available here features a series of insightful tutorials and discussions on various topics related to cybersecurity.
Get PROXY List that gets updated everyday
Attack Surface Management Platform
Programs and or walkthroughs relating to PicoCTF (https://picoctf.org/)
A Go program that checks the security flags for Linux binaries
Luper Brute-Force ( Similar to Dirsearch )
Tool to search for the headers of a website and to perform an intensive search for subdomains.
Use favicon.ico to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.
Gather and update all available and newest CVEs with their PoC.
It's a Docker Environment for Pentesting which having all the required tool for VAPT.
Official website of TWC
Add a description, image, and links to the hacking topic page so that developers can more easily learn about it.
To associate your repository with the hacking topic, visit your repo's landing page and select "manage topics."