Learn All Cyber Tools & Techniques
- 3 followers
- Côte d'Ivoire
Popular repositories Loading
-
priv_esc
priv_esc PublicForked from insolitum/priv_esc
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
C# 2
-
RedTeaming-Tactics-and-Techniques
RedTeaming-Tactics-and-Techniques PublicForked from mantvydasb/RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
PowerShell 2
-
digital-forensics-lab
digital-forensics-lab PublicForked from vonderchild/digital-forensics-lab
PHP 2
-
-
Free-Certifications
Free-Certifications PublicForked from cloudcommunity/Free-Certifications
A curated list of free courses & certifications.
-
malicious_ip_addresses
malicious_ip_addresses PublicForked from duggytuxy/Data-Shield_IPv4_Blocklist
These are the IP addresses of the most active C2/Botnets/Zombies/Scanners in European Cyber Space
Repositories
- PentestingEverything Public Forked from m14r41/PentestingEverything
Penetration Testing For - Web | Mobile | API | Thick Client | Source Code Review | DevSecOps | Wireless | Network Pentesting, etc...
CyberThinkerer/PentestingEverything’s past year of commit activity - ligolo-ng Public Forked from nicocha30/ligolo-ng
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
CyberThinkerer/ligolo-ng’s past year of commit activity - CTF-API-vuln-bank Public Forked from Commando-X/vuln-bank
A deliberately vulnerable banking application designed for practicing secure code reviews and API security testing. Features common vulnerabilities found in real-world applications, making it an ideal platform for security professionals, developers, and enthusiasts to learn security testing and secure coding practices in a safe environment.
CyberThinkerer/CTF-API-vuln-bank’s past year of commit activity - awesome-forensics Public Forked from cugu/awesome-forensics
⭐️ A curated list of awesome forensic analysis tools and resources
CyberThinkerer/awesome-forensics’s past year of commit activity - Bug-Bounty-Hunting-Methodology-2025 Public Forked from amrelsagaei/Bug-Bounty-Hunting-Methodology-2025
Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.
CyberThinkerer/Bug-Bounty-Hunting-Methodology-2025’s past year of commit activity - OneDorkForAll Public Forked from SecShiv/OneDorkForAll
An insane list of all dorks taken from everywhere from various different sources.
CyberThinkerer/OneDorkForAll’s past year of commit activity - Chrome-App-Bound-Encryption-Decryption Public Forked from xaitax/Chrome-App-Bound-Encryption-Decryption
Tool to decrypt App-Bound encrypted keys in Chrome 127+, using the IElevator COM interface with path validation and encryption protections.
CyberThinkerer/Chrome-App-Bound-Encryption-Decryption’s past year of commit activity - hayabusa Public Forked from Yamato-Security/hayabusa
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
CyberThinkerer/hayabusa’s past year of commit activity - CVE-2024-45519 Public Forked from Chocapikk/CVE-2024-45519
Zimbra - Remote Command Execution (CVE-2024-45519)
CyberThinkerer/CVE-2024-45519’s past year of commit activity
People
This organization has no public members. You must be a member to see who’s a part of this organization.
Top languages
Loading…
Most used topics
Loading…