Asset inventory of over 800 public bug bounty programs.
-
Updated
Jun 6, 2024 - Shell
Hacking refers to the practice of gaining unauthorized access to data in a system or computer. This topic encompasses various forms of hacking, including black-hat and grey-hat hacking, which involve malicious or non-malicious intent. It explores the tools and techniques used by hackers, the motivations behind hacking, and the measures organizations can take to protect themselves.
Asset inventory of over 800 public bug bounty programs.
A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers
A VSCode Workspace based hacking environment utils. Starting your Note-Driven Hacking experience. Checkout the following link to sample of HackThebox mist.htb
Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets!
This repository is dedicated to showcasing a collection of educational videos curated with gratitude for Defronix and my mentor Mr. Nitesh Singh. The content available here features a series of insightful tutorials and discussions on various topics related to cybersecurity.
Hourly updated database of exploit and exploitation reports
Vulnerable API for educational purposes
An auto-updating list of shodan dorks with info on the amount of results they return!
Update free every 2 hours
Hash Crack is a Python-based tool designed for cracking password hashes. It supports simultaneous cracking of multiple hashes by leveraging multi-core processing. The tool is educational and aims to raise awareness about the importance of strong passwords.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Spirit - Network Pentest Tools
A recursive internet scanner for hackers.
DarkScout is a simple, nimble subdomain enumeration tool written in Rust language. It is designed to help bug bounty hunters, security professionals and penetration testers discover subdomains of a given target domain.
Automated Adversary Emulation Platform
Get PROXY List that gets updated everyday
my notes
The Network Execution Tool
Real-world infosec wordlists, updated regularly