Yogi-Codes's starred repositories
Learning-C
A series of mini-projects used to learn C for beginners
Burp-Suite-Pro-Scan-Profiles
Custom scan profiles for use with Burp Suite Pro
AwesomeXSS
Awesome XSS stuff
Damn-Vulnerable-Drone
Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providing a realistic environment for hands-on drone hacking.
Get-RBCD-Threaded
Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments
ai-exploits
A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
All-In-One-CyberSecurity-Resources
List of CyberSecurity Resources and some different Sub-Domains of CyberSecurity
Pentest-practice
A curated list of hacking environments where you can train your cyber skills legally and safely
public-bugbounty-programs
Community curated list of public bug bounty and responsible disclosure programs.
trufflehog
Find, verify, and analyze leaked credentials
Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Here is a simple way to evade anti-virus software when creating backdoors!
spidertrap
Traps web spiders
rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine's correlation, it just makes recon effortless.
h4cker
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.