Hourly updated database of exploit and exploitation reports
-
Updated
Jun 6, 2024 - Python
Hourly updated database of exploit and exploitation reports
An auto-updating list of shodan dorks with info on the amount of results they return!
Artículos relacionados a la Ciberseguridad y Hacking.
Reconmap's web client written in React. Manage all your pentest projects from a single place.
Sharing my knowledge, tips and tricks as a Network and a Software Engineer. Also from my Cyber Security Learning Journy sharing related knowledge to Pentesting, Enumeration, other Tools and commands.
🤖 The Modern Port Scanner 🤖
🔨 List all IP ranges from: Google (Cloud & GoogleBot), Bing (Bingbot), Amazon (AWS), Microsoft, Oracle (Cloud), GitHub, Facebook (Meta), OpenAI (GPTBot) and other with daily updates.
Asset inventory of over 800 public bug bounty programs.
The Network Execution Tool
A recursive internet scanner for hackers.
Gather and update all available and newest CVEs with their PoC.
Library to resolve function pointers to loaded modules in memory, such as functions provided by Windows DLL's
This C# app brute forces SMB services to find a remote user's password. It asks for IP, username, and password list file. Then it tries each password, logging attempts and showing progress. It's a more readable and efficient conversion from a batch script.
The most exhaustive list of reliable DNS resolvers.
Script para la instalación automática de una capa de personalización en Kali Linux OS.
Demostración SQL Injection 💉
Spirit - Network Pentest Tools
Helping Ethical Hackers use LLMs in 50 Lines of Code or less..
A CLI tool for creating network covert channels within .pcap files.
Add a description, image, and links to the pentesting topic page so that developers can more easily learn about it.
To associate your repository with the pentesting topic, visit your repo's landing page and select "manage topics."