A curated list of awesome Hacking. Inspired by awesome-machine-learning
If you want to contribute to this list (please do), send me a pull request!
For a list of free hacking books available for download, go here
docker pull kalilinux/kali-linux-docker official Kali Linuxdocker pull owasp/zap2docker-stable – official OWASP ZAPdocker pull wpscanteam/wpscan – official WPScandocker pull metasploitframework/metasploit-framework – Official Metasploitdocker pull citizenstig/dvwa – Damn Vulnerable Web Application (DVWA)docker pull wpscanteam/vulnerablewordpress – Vulnerable WordPress Installationdocker pull hmlio/vaas-cve-2014-6271 – Vulnerability as a service: Shellshockdocker pull hmlio/vaas-cve-2014-0160 – Vulnerability as a service: Heartbleeddocker pull opendns/security-ninjas – Security Ninjasdocker pull noncetonic/archlinux-pentest-lxde – Arch Linux Penetration Testerdocker pull diogomonica/docker-bench-security – Docker Bench for Securitydocker pull ismisepaul/securityshepherd – OWASP Security Shepherddocker pull danmx/docker-owasp-webgoat – OWASP WebGoat Project docker imagedocker pull vulnerables/web-owasp-nodegoat – OWASP NodeGoatdocker pull citizenstig/nowasp – OWASP Mutillidae II Web Pen-Test Practice Applicationdocker pull bkimminich/juice-shop – OWASP Juice Shopdocker pull phocean/msf – Docker MetasploitJava remains one of the most widely used programming platforms for servers, enterprise applications, Android…
Ubuntu users often download software directly from developer websites instead of using the default app…
Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…