Collection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.
#Awesome#A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. With repository stars⭐ and forks🍴
"Essential Kali Linux commands for ethical hackers and penetration testers."
The purpose of these documents, it was to execute several efficiency and detection tests in some endpoint solutions, this document brings the result of the defensive security analysis with an offensiv...
Trojan (Ransomware) Phishing Simulator for Cybersecurity Training.
IP Hunter é uma ferramenta Python para obter informações de geolocalização de endereços IP. Com essa ferramenta, você pode obter informações detalhadas, como país, cidade, região, ISP, ASN, latitude/l...
A community list of companies ignoring or denying fair rewards to security researchers. Promoting fairness and transparency in bug bounties.
Government Cyber Coordination Centre - Vulnerability Reporting Service - Infrastructure as Code
This repository offers a curated collection of resources, including lists, manuals, and tools that enhance productivity. Explore various topics and find useful information to support your projects. 🛠...
#大语言模型#Knowledge is a modern static documentation generator that turns Markdown files into professional documentation sites. With its user-friendly templates, you can save time and improve the quality of you...
A description of all my audits , vulnerability,issues i submitted to improve the smart contract
BloodyMary is a cybersecurity training tool that simulates phishing attacks to educate users about cyber threats and social engineering. 🛡️💻