Lists (14)
Sort Name ascending (A-Z)
Challenge started 31-01-2023
Challenge started 31-01-2023ChatGPT
ChatGPTCrypto bug bounty tools
Crypto bug bounty toolsCrypto Smart Contract
Crypto Smart ContractEthical Hacking
Ethical HackingFun project
Fun projectMEV Flashloan
MEV FlashloanMobile Security Penetration Test
Mobile Security Penetration TestStars
Command Line Interface wallet app for secure transactions & RAILGUN privacy across 0x and 0zk addresses.
AGI's query engine - Platform for building AI that can learn and answer questions over federated data.
Scrape Instagram content and stories, using a new technique based on the har file (No Token + No public API).
Solidity CTF challenges for mrstealyocrypto.xyz (hardhat)
Building Startups with an AI Co-Founder
Automate common Instagram activities such as following, unfollowing, commenting and reposting images from instagram accounts.
This script is designed for educational purposes only and allows users to simulate a DDoS attack. Please note that hacking is illegal and this script should not be used for any malicious activities…
An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.
This repo includes ChatGPT prompt curation to use ChatGPT and other LLM tools better.
🔮 ChatGPT Desktop Application (Mac, Windows and Linux)
n0kovo / awesome-wordlists
Forked from gmelodie/awesome-wordlistsA curated list wordlists for bruteforcing and fuzzing
A set of tools to mod and reverse engineer PSX games.
Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a breadth-first search.
An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !
This is a shell script that creates an SSH backdoor on an iPhone.
📚 Freely available programming books
quick and dirty proof-of-concept to hide shells in images
PounceKey's is a Accessibility Service keylogger for Android 5 to 13! full launcher stealth. choose between receiving logs via IP, Gmail, or Discord. No txt files on device, straight buffer in logc…
A curated list of hacking environments where you can train your cyber skills legally and safely
Python classes to aid rapid development of Uniswap V2 & V3, Curve V1, and Solidly V2 arbitrage bots on EVM-compatible blockchains
A FREE comprehensive online Go hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Golang from scratch.
Course material about common vulnerabilities, security and audits of Solidity smart contracts that I use during my lectures
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
DevOps Roadmap for 2024. with learning resources