Tips and Tutorials for Bug Bounty and also Penetration Tests.
-
Updated
Dec 9, 2022
Tips and Tutorials for Bug Bounty and also Penetration Tests.
A collection of awesome software, libraries, learning tutorials, documents, books & technical resources and cool stuff about dark web.
Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.
(On 06/04/2021) Local Keylogger software has been made for the latest up-to-date "Windows 7, 8 and 10" operatings systems. It managed to circumvent the "Windows Defender" program.
(On 09/04/2021) Remote Keylogger software has been made for the latest up-to-date "Windows 7, 8 and 10" operatings systems. It managed to circumvent the "Windows Defender" program.
It checks the free proxy addresses it collects from websites and saves the working proxy addresses to the file.
Allows creating and tracking http and https protocol calls. It also supports Proxy.
I am a self taught programmer, Linux neck beard, web dev and FOSS enthusiast. Come check me out !
This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which you must know in cybersecurity field.
Bulk network analyzer via curl to detect specific example text for vulnerability research
This is a simple python script that scans the port of a specific machine.
pr0xh4ck || My Official Website
Add a description, image, and links to the ethical-hacker topic page so that developers can more easily learn about it.
To associate your repository with the ethical-hacker topic, visit your repo's landing page and select "manage topics."