Hourly updated database of exploit and exploitation reports
-
Updated
Jun 13, 2024 - Python
Hacking refers to the practice of gaining unauthorized access to data in a system or computer. This topic encompasses various forms of hacking, including black-hat and grey-hat hacking, which involve malicious or non-malicious intent. It explores the tools and techniques used by hackers, the motivations behind hacking, and the measures organizations can take to protect themselves.
Hourly updated database of exploit and exploitation reports
Redirect All Traffic Through Tor Network For Kali Linux
Real-world infosec wordlists, updated regularly
Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现
An auto-updating list of shodan dorks with info on the amount of results they return!
Get PROXY List that gets updated everyday
Update free every 2 hours
the only repository you've ever needed. supercharge your application today with this ultra performant library.
A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers
Fileless Open-Source Stealer, all logs will be sent using discord webhooks
A repository where i store all my progression when it comes to learning C++ and gamehacking.
API tests de seguridad para identificar vulnerabilidades ( hackingyseguridad.com )
A web security gateway, serve as a reverse proxy to protect your websites from attacks and exploits.
Gather and update all available and newest CVEs with their PoC.
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Linux Cyber Warfare Distro
The best password dictionary generator
Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.
Pentest focused NixOS config