👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
Find a file
Mia Steinkirch 22bd089792 👨👩 Update readme
2019-10-27 21:04:03 -07:00
.github 👶🏼 Add funding 2019-10-27 20:53:28 -07:00
Botnets 👧🏼 Clean up readme 2019-10-27 20:53:55 -07:00
Cryptography Bump flask (#10) 2019-10-23 07:08:58 -07:00
CTFs_and_WarGames 👩🏾 Clean up readme 2019-10-27 20:57:07 -07:00
Ddos (feat) add ddos resources (#15) 2019-10-23 07:06:31 -07:00
Dockerfiles few additions 2015-09-04 17:17:48 -07:00
Forensics will finish later 2015-11-26 20:06:00 -08:00
IOCs 👩🏻 Clean up readme 2019-10-27 20:58:38 -07:00
Linux_Hacking Update README.md 2016-11-22 00:37:59 -05:00
Memory_Exploits disclaimer 2015-02-12 18:42:26 -08:00
Mobile add mobile 2015-07-04 12:53:18 -07:00
Mobile_Hacking 👨👩🏾‍🦳 Update readme 2019-10-27 21:03:32 -07:00
Network_and_802.11 Add some fuzzing stuff and wordlists 2015-08-30 12:06:08 -07:00
Other_guides Add hack back pastebin 2016-08-06 12:50:04 -07:00
Other_Hackings 👨👩 Update readme 2019-10-27 21:04:03 -07:00
Pen_Testing_Scripts 👩 Clean up Readme 2019-10-27 21:00:17 -07:00
Reverse_Engineering 👨🏽 Clean up readme 2019-10-27 20:55:15 -07:00
Rubber_Duck 👩🏾 Clean up readme 2019-10-27 20:58:02 -07:00
Steganography 👨🏿 Clean up Readme 2019-10-27 21:01:58 -07:00
Vulnerabilities_and_Exploits 👴🏼 Clean up readme 2019-10-27 20:55:40 -07:00
Web_Security 👧🏿 Clean up reae 2019-10-27 20:54:48 -07:00
README.md 👨🏻 Clean up Readme 2019-10-27 21:00:43 -07:00
requirements.txt Bump pyopenssl from 0.13.1 to 17.5.0 (#8) 2019-10-23 07:09:28 -07:00

Pentesting Resources

All information and software available on this site are for educational purposes only. Use these at your own discretion, the site owners cannot be held responsible for any damages caused. The views expressed on this site are our own and do not necessarily reflect those of our employers.

Usage of all tools on this site for attacking targets without prior mutual consent is illegal. It is the end users responsibility to obey all applicable local, state and federal laws. We assume no liability and are not responsible for any misuse or damage caused by this site.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Articles

General Hacking

Post-Exploitation

CI/CD pipelines

Books