A curated list of awesome Hacking. Inspired by awesome-machine-learning
If you want to contribute to this list (please do), send me a pull request!
For a list of free hacking books available for download, go here
docker pull kalilinux/kali-linux-docker official Kali Linuxdocker pull owasp/zap2docker-stable – official OWASP ZAPdocker pull wpscanteam/wpscan – official WPScandocker pull metasploitframework/metasploit-framework – Official Metasploitdocker pull citizenstig/dvwa – Damn Vulnerable Web Application (DVWA)docker pull wpscanteam/vulnerablewordpress – Vulnerable WordPress Installationdocker pull hmlio/vaas-cve-2014-6271 – Vulnerability as a service: Shellshockdocker pull hmlio/vaas-cve-2014-0160 – Vulnerability as a service: Heartbleeddocker pull opendns/security-ninjas – Security Ninjasdocker pull noncetonic/archlinux-pentest-lxde – Arch Linux Penetration Testerdocker pull diogomonica/docker-bench-security – Docker Bench for Securitydocker pull ismisepaul/securityshepherd – OWASP Security Shepherddocker pull danmx/docker-owasp-webgoat – OWASP WebGoat Project docker imagedocker pull vulnerables/web-owasp-nodegoat – OWASP NodeGoatdocker pull citizenstig/nowasp – OWASP Mutillidae II Web Pen-Test Practice Applicationdocker pull bkimminich/juice-shop – OWASP Juice Shopdocker pull phocean/msf – Docker MetasploitGeneral Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…
If you are a Linux user, you have probably seen commands like chmod 777 while…
Vim and Vi are among the most powerful text editors in the Linux world. They…
Working with compressed files is a common task for any Linux user. Whether you are…
In the digital era, an email address can reveal much more than just a contact…