#

ethical-hacking

The-Art-of-Hacking/h4cker
https://static.github-zh.com/github_avatars/The-Art-of-Hacking?size=40

#Awesome#This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...

Jupyter Notebook 23.07 k
9 天前
https://static.github-zh.com/github_avatars/farhanashrafdev?size=40

This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, cov...

11.61 k
15 天前
https://static.github-zh.com/github_avatars/husnainfareed?size=40

#Awesome#😎 🔗 Awesome list about all kinds of resources for learning Ethical Hacking and Penetration Testing.

2.89 k
9 个月前
https://static.github-zh.com/github_avatars/EONRaider?size=40

Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues invo...

Python 2.23 k
1 年前
https://static.github-zh.com/github_avatars/xalgord?size=40

A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for identifying and exploiting vulnerabilities.

1.63 k
7 天前
https://static.github-zh.com/github_avatars/isanchop?size=40
JavaScript 1.49 k
2 年前
https://static.github-zh.com/github_avatars/alvin-tosh?size=40

🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.

Assembly 1.11 k
2 年前
https://static.github-zh.com/github_avatars/4lbH4cker?size=40

Albanian Hacking Tool!! Tools to help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery, Anonymous-sms, Webcam Hack • Powerful DDOS attack too...

Shell 1.07 k
9 个月前
https://static.github-zh.com/github_avatars/EONRaider?size=40

Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involvi...

Python 1.01 k
3 个月前
https://static.github-zh.com/github_avatars/Hamed233?size=40

A comprehensive, step-by-step guide to mastering cybersecurity from beginner to expert level with curated resources, tools, and career guidance

981
3 个月前
https://static.github-zh.com/github_avatars/jaykali?size=40

#安卓#Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.

HTML 952
4 年前
https://static.github-zh.com/github_avatars/R3dy?size=40

Vagrant VirtualBox environment for conducting an internal network penetration test

Ruby 928
2 年前
https://static.github-zh.com/github_avatars/stivenhacker?size=40

Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.

C++ 799
1 年前
https://static.github-zh.com/github_avatars/EONRaider?size=40
Python 765
7 天前
loading...
Website
Wikipedia