Nighthawk's repositories
Awesome-Bugbounty-Writeups
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
WindowsElevation
Windows Elevation(持续更新)
Advanced-SQL-Injection-Cheatsheet
A cheat sheet that contains advanced queries for SQL Injection of all types.
Awesome-Asset-Discovery
List of Awesome Asset Discovery Resources
awesome-bugbounty-tools
A curated list of various bug bounty tools
Awesome-Cellular-Hacking
Awesome-Cellular-Hacking
awesome-ctf
A curated list of CTF frameworks, libraries, resources and softwares
awesome-rat
RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
Bug-Bounty-Roadmaps
Bug Bounty Roadmaps
bugbounty-cheatsheet
A list of interesting payloads, tips and tricks for bug bounty hunters.
command-injection-payload-list
🎯 Command Injection Payload List
evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
h4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
hacker
Hacker is a Jekyll theme for GitHub Pages
InjuredAndroid
A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
katacoda-scenarios
Katacoda Scenarios
LinEnum
Scripted Local Linux Enumeration & Privilege Escalation Checks
linux-smart-enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Pentest-Cheat-Sheets
A collection of snippets of codes and commands to make your life easier!
PENTESTING-BIBLE
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
Privilege-Escalation
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Resources-for-Beginner-Bug-Bounty-Hunters
A list of resources for those interested in getting started in bug bounties
SecLists-1
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
SEF
Subdomain Enumeration Framework
TL-TROJAN
A collection of source code for various RATs, Stealers, and other Trojans.
Windows10-RDP-2-CORE-7GB-Ram
Free Windows 10 RDP with intel 2 core 7gb ram
Zeus
NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about your lame hacking attempts.