A curated list of awesome Hacking. Inspired by awesome-machine-learning
If you want to contribute to this list (please do), send me a pull request!
For a list of free hacking books available for download, go here
docker pull kalilinux/kali-linux-docker official Kali Linuxdocker pull owasp/zap2docker-stable – official OWASP ZAPdocker pull wpscanteam/wpscan – official WPScandocker pull metasploitframework/metasploit-framework – Official Metasploitdocker pull citizenstig/dvwa – Damn Vulnerable Web Application (DVWA)docker pull wpscanteam/vulnerablewordpress – Vulnerable WordPress Installationdocker pull hmlio/vaas-cve-2014-6271 – Vulnerability as a service: Shellshockdocker pull hmlio/vaas-cve-2014-0160 – Vulnerability as a service: Heartbleeddocker pull opendns/security-ninjas – Security Ninjasdocker pull noncetonic/archlinux-pentest-lxde – Arch Linux Penetration Testerdocker pull diogomonica/docker-bench-security – Docker Bench for Securitydocker pull ismisepaul/securityshepherd – OWASP Security Shepherddocker pull danmx/docker-owasp-webgoat – OWASP WebGoat Project docker imagedocker pull vulnerables/web-owasp-nodegoat – OWASP NodeGoatdocker pull citizenstig/nowasp – OWASP Mutillidae II Web Pen-Test Practice Applicationdocker pull bkimminich/juice-shop – OWASP Juice Shopdocker pull phocean/msf – Docker MetasploitIntroduction Google Dorking is a technique where advanced search operators are used to uncover information…
Linux is renowned for its versatility, open-source nature, and security. Whether you're a beginner, developer,…
Cyber insurance helps businesses and individuals mitigate financial losses from data breaches, ransomware, extortion, legal…
Ransomware is one of the most dangerous and destructive forms of cybercrime today. With cybercriminals…
Social media is a key part of our daily lives, with millions of users sharing…
What Are Data Brokers? Data brokers are companies that collect, aggregate, and sell personal information,…