An open API service indexing awesome lists of open source software.

https://github.com/j5py/list

Logic to keep an alphabetical [security] list of unique [GitHub clickable] links: if it can't be starred, then it's listed (the initial idea came from the need to practice Python).
https://github.com/j5py/list

class cli information-security inheritance mro python self-descriptive

Last synced: 3 months ago
JSON representation

Logic to keep an alphabetical [security] list of unique [GitHub clickable] links: if it can't be starred, then it's listed (the initial idea came from the need to practice Python).

Awesome Lists containing this project

README

        


http://project-rainbowcrack.com

https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard

https://addons.mozilla.org/en-US/firefox/addon/user-agent-string-switcher

https://addons.mozilla.org/en-US/firefox/addon/wappalyzer

https://ahrefs.com/blog/google-advanced-search-operators

https://attack.mitre.org

https://attack.mitre.org/techniques/T1574/001

https://blog.netwrix.com/2022/01/11/understanding-lsa-protection

https://book.hacktricks.xyz

https://cheatsheetseries.owasp.org

https://crackstation.net

https://crt.sh

https://cryptohack.org

https://cryptoji.com

https://cve.mitre.org

https://cwe.mitre.org

https://danielmiessler.com/study/tcpdump

https://delinea.com/blog/windows-privilege-escalation

https://dirtycow.ninja

https://dnsdumpster.com

https://dnsleaktest.com

https://duckduckgo.com/?q=DuckDuckGo&ia=chat

https://electricalacademia.com/computer/windows-networking-basics

https://en.hackndo.com

https://en.wikipedia.org/wiki/Birthday_attack

https://en.wikipedia.org/wiki/Captive_portal

https://en.wikipedia.org/wiki/Category:Computer_security_exploits

https://en.wikipedia.org/wiki/Comparison_of_command_shells

https://en.wikipedia.org/wiki/Computer_hardware

https://en.wikipedia.org/wiki/Credential_stuffing

https://en.wikipedia.org/wiki/Cyber_threat_intelligence

https://en.wikipedia.org/wiki/DICT

https://en.wikipedia.org/wiki/Debian

https://en.wikipedia.org/wiki/Dictionary_attack

https://en.wikipedia.org/wiki/Endpoint_detection_and_response

https://en.wikipedia.org/wiki/File_URI_scheme

https://en.wikipedia.org/wiki/GNU_Compiler_Collection

https://en.wikipedia.org/wiki/Google_hacking

https://en.wikipedia.org/wiki/IDN_homograph_attack

https://en.wikipedia.org/wiki/IPv4_address_exhaustion

https://en.wikipedia.org/wiki/Lightweight_Directory_Access_Protocol

https://en.wikipedia.org/wiki/List_of_DNS_record_types

https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers

https://en.wikipedia.org/wiki/List_of_file_formats

https://en.wikipedia.org/wiki/List_of_file_signatures

https://en.wikipedia.org/wiki/List_of_hash_functions

https://en.wikipedia.org/wiki/Logic_gate

https://en.wikipedia.org/wiki/MD5

https://en.wikipedia.org/wiki/Monitor_mode

https://en.wikipedia.org/wiki/NetBIOS

https://en.wikipedia.org/wiki/Netwide_assembly

https://en.wikipedia.org/wiki/Pass_the_hash

https://en.wikipedia.org/wiki/Password_cracking

https://en.wikipedia.org/wiki/Public-key_cryptography

https://en.wikipedia.org/wiki/Rainbow_table

https://en.wikipedia.org/wiki/Security_Account_Manager

https://en.wikipedia.org/wiki/Setuid

https://en.wikipedia.org/wiki/Single_point_of_failure

https://en.wikipedia.org/wiki/Standard_streams

https://en.wikipedia.org/wiki/Stuxnet

https://en.wikipedia.org/wiki/Windows_Registry

https://en.wikipedia.org/wiki/X86_instruction_listings

https://exegol.readthedocs.io

https://exploit-notes.hdks.org

https://fr.wikipedia.org/wiki/Active_Directory

https://gchq.github.io/CyberChef

https://gtfobins.github.io

https://haveibeenpwned.com

https://help.shodan.io

https://highon.coffee/blog/penetration-testing-tools-cheat-sheet

https://infinitelogins.com/2021/02/24/linux-privilege-escalation-weak-file-permissions-writable-etc-passwd

https://infosniper.net

https://learn.microsoft.com/en-us/training/modules/network-fundamentals

https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator

https://nvd.nist.gov/vuln/full-listing

https://orange-cyberdefense.github.io/ocd-mindmaps

https://osintframework.com

https://owasp.org/Top10

https://pentestmonkey.net

https://portswigger.net/burp/documentation

https://quickref.me/nc

https://search.censys.io

https://shop.hak5.org

https://start.me/p/wMdQMQ/tools

https://steflan-security.com/windows-privilege-escalation-alwaysinstallelevated-policy

https://talosintelligence.com

https://thinkadnet.com/2021/03/edr-vs-antivirus-whats-the-difference

https://tryhackme.com/glossary

https://ui.ctsearch.entrust.com/ui/ctsearchui

https://urlhaus.abuse.ch

https://web.archive.org/web/20200901140719/http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet

https://wiki.owasp.org/index.php/OWASP_favicon_database

https://www.abuseipdb.com

https://www.blackbox.ai

https://www.cve.org

https://www.dcode.fr

https://www.ettercap-project.org

https://www.exploit-db.com

https://www.hybrid-analysis.com

https://www.ired.team

https://www.joesandbox.com

https://www.kali.org

https://www.linuxkernelcves.com/cves

https://www.mandiant.com/resources/blog/commando-vm-windows-offensive-distribution

https://www.nirsoft.net/password_recovery_tools.html

https://www.offsec.com/metasploit-unleashed/msfvenom

https://www.practicallynetworked.com/networking-commands

https://www.rapid7.com/db

https://www.royhills.co.uk/wiki/index.php/Arp-scan_Documentation

https://www.shodan.io

https://www.srihash.org

https://www.tenable.com/cve/newest

https://www.tenable.com/downloads/nessus

https://www.thehacker.recipes

https://www.virustotal.com/gui/home/upload

https://www.vulnhub.com

https://www.wireguard.com