h4cker
awesome-security-feed
h4cker | awesome-security-feed | |
---|---|---|
4 | 1 | |
16,888 | 108 | |
1.8% | - | |
9.2 | 0.0 | |
16 days ago | over 1 year ago | |
Jupyter Notebook | ||
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
h4cker
- Ciberseguridad / hacking etico
-
Cybersecurity Repositories
The Art of Hacking Series
- What's the "best" coding language to know/learn?
-
How to use a home lab to study Penetration Testing?
https://github.com/The-Art-of-Hacking/h4cker is a good repo
awesome-security-feed
What are some alternatives?
Vulnnr - Vulnnr - Vulnerability Scanner And Mass Exploiter, created for pentesting.
awesome-cybersecurity-blueteam - :computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Microsoft-365-Defender-Hunting-Queries - Sample queries for Advanced hunting in Microsoft 365 Defender
awesome-oscp - A curated list of awesome OSCP resources
RomBuster - RomBuster is a router exploitation tool that allows to disclosure network router admin password.
Villain - Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
Hydroxide - Lua runtime introspection and network capturing tool for games on the Roblox engine.
hawk - Network, recon and offensive-security tool for Linux.
vulscan - Advanced vulnerability scanning with Nmap NSE
Keylogger - Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
dora - Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
awesome-cyber-security-university - 🎓 Because Education should be free. Contributions welcome! 🕵️