| The-Art-of-Hacking/h4cker |
15,693 |
|
0 |
0 |
about 2 years ago |
0 |
|
2 |
mit |
Jupyter Notebook |
| This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more. |
| smicallef/spiderfoot |
11,035 |
|
0 |
0 |
about 2 years ago |
0 |
|
162 |
mit |
Python |
| SpiderFoot automates OSINT for threat intelligence and mapping your attack surface. |
| 1N3/Sn1per |
7,235 |
|
0 |
0 |
about 2 years ago |
0 |
|
8 |
other |
Shell |
| Attack Surface Management Platform |
| AzeemIdrisi/PhoneSploit-Pro |
5,555 |
|
0 |
0 |
almost 2 years ago |
0 |
|
4 |
gpl-3.0 |
Python |
| An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session. |
| ihebski/DefaultCreds-cheat-sheet |
5,023 |
|
0 |
0 |
about 2 years ago |
2 |
November 28, 2023 |
0 |
mit |
Python |
| One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️ |
| infobyte/faraday |
4,422 |
|
1 |
1 |
about 2 years ago |
37 |
November 14, 2023 |
43 |
gpl-3.0 |
Python |
| Open Source Vulnerability Management Platform |
| A-poc/RedTeam-Tools |
4,019 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
|
|
| Tools and Techniques for Red Team / Penetration Testing |
| Hack-with-Github/Free-Security-eBooks |
3,997 |
|
0 |
0 |
almost 7 years ago |
0 |
|
3 |
|
|
| Free Security and Hacking eBooks |
| jassics/security-study-plan |
3,949 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
|
|
| Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on... |
| t3l3machus/Villain |
3,376 |
|
0 |
0 |
over 2 years ago |
0 |
|
21 |
other |
Python |
| Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines). |