A curated list of awesome Hacking. Inspired by awesome-machine-learning
If you want to contribute to this list (please do), send me a pull request!
For a list of free hacking books available for download, go here
docker pull kalilinux/kali-linux-docker official Kali Linuxdocker pull owasp/zap2docker-stable – official OWASP ZAPdocker pull wpscanteam/wpscan – official WPScandocker pull metasploitframework/metasploit-framework – Official Metasploitdocker pull citizenstig/dvwa – Damn Vulnerable Web Application (DVWA)docker pull wpscanteam/vulnerablewordpress – Vulnerable WordPress Installationdocker pull hmlio/vaas-cve-2014-6271 – Vulnerability as a service: Shellshockdocker pull hmlio/vaas-cve-2014-0160 – Vulnerability as a service: Heartbleeddocker pull opendns/security-ninjas – Security Ninjasdocker pull noncetonic/archlinux-pentest-lxde – Arch Linux Penetration Testerdocker pull diogomonica/docker-bench-security – Docker Bench for Securitydocker pull ismisepaul/securityshepherd – OWASP Security Shepherddocker pull danmx/docker-owasp-webgoat – OWASP WebGoat Project docker imagedocker pull vulnerables/web-owasp-nodegoat – OWASP NodeGoatdocker pull citizenstig/nowasp – OWASP Mutillidae II Web Pen-Test Practice Applicationdocker pull bkimminich/juice-shop – OWASP Juice Shopdocker pull phocean/msf – Docker MetasploitWhen people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…
A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…