maxos
PENTESTING-BIBLE
maxos | PENTESTING-BIBLE | |
---|---|---|
1 | 3 | |
25 | 12,623 | |
- | - | |
9.8 | 1.2 | |
3 days ago | about 1 year ago | |
HTML | ||
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
maxos
PENTESTING-BIBLE
- Bug Bounty Resources
- 🔰 PENTESTING-BIBLE: Aprenda sobre el hacking ético, reconnaissance, hacking Windows y Linux, y #pentesting de redes inalámbricas
- blaCCkHatHacEEkr/PENTESTING-BIBLE - Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
What are some alternatives?
htkit - Information Gathering Simplified.
hacker-roadmap - A collection of hacking tools, resources and references to practice ethical hacking.
THC-Archive - All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Rafel-Rat - -------> RAFEL<------ Android Rat Written in Java With WebPanel For Controlling Victims...Hack Android Devices
oxdork - Google dorking tool
awesome-appimage - Lovingly crafted AppImage tools and resources
CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera - 🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
awesome-osint - :scream: A curated list of amazingly awesome OSINT
osmedeus - A Workflow Engine for Offensive Security
sql-injection-payload-list - 🎯 SQL Injection Payload List
PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Java-Deserialization-Cheat-Sheet - The cheat sheet about Java Deserialization vulnerabilities