A curated list of awesome Hacking. Inspired by awesome-machine-learning
If you want to contribute to this list (please do), send me a pull request!
For a list of free hacking books available for download, go here
docker pull kalilinux/kali-linux-docker official Kali Linuxdocker pull owasp/zap2docker-stable – official OWASP ZAPdocker pull wpscanteam/wpscan – official WPScandocker pull metasploitframework/metasploit-framework – Official Metasploitdocker pull citizenstig/dvwa – Damn Vulnerable Web Application (DVWA)docker pull wpscanteam/vulnerablewordpress – Vulnerable WordPress Installationdocker pull hmlio/vaas-cve-2014-6271 – Vulnerability as a service: Shellshockdocker pull hmlio/vaas-cve-2014-0160 – Vulnerability as a service: Heartbleeddocker pull opendns/security-ninjas – Security Ninjasdocker pull noncetonic/archlinux-pentest-lxde – Arch Linux Penetration Testerdocker pull diogomonica/docker-bench-security – Docker Bench for Securitydocker pull ismisepaul/securityshepherd – OWASP Security Shepherddocker pull danmx/docker-owasp-webgoat – OWASP WebGoat Project docker imagedocker pull vulnerables/web-owasp-nodegoat – OWASP NodeGoatdocker pull citizenstig/nowasp – OWASP Mutillidae II Web Pen-Test Practice Applicationdocker pull bkimminich/juice-shop – OWASP Juice Shopdocker pull phocean/msf – Docker MetasploitArtificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…
Image credit:pexels.com If you think back to the early days of personal computing, you probably…
In an era defined by technological innovation, the way people handle and understand money has…
The online world becomes more visually driven with every passing year. Images spread across websites,…
General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…