Coder Social home page Coder Social logo

j5py / list Goto Github PK

View Code? Open in Web Editor NEW
0.0 1.0 0.0 26 KB

Logic to keep an alphabetical [security] list of unique [GitHub clickable] links: if it can't be starred, then it's listed (the initial idea came from the need to practice Python).

License: MIT License

Python 100.00%
inheritance python class

list's Introduction


http://project-rainbowcrack.com
https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard
https://addons.mozilla.org/en-US/firefox/addon/user-agent-string-switcher
https://addons.mozilla.org/en-US/firefox/addon/wappalyzer
https://attack.mitre.org
https://book.hacktricks.xyz
https://cheatsheetseries.owasp.org
https://crackstation.net
https://crt.sh
https://cryptohack.org
https://cryptoji.com
https://cve.mitre.org
https://cwe.mitre.org
https://danielmiessler.com/study/tcpdump
https://dirtycow.ninja
https://dnsdumpster.com
https://en.wikipedia.org/wiki/Birthday_attack
https://en.wikipedia.org/wiki/Captive_portal
https://en.wikipedia.org/wiki/Category:Computer_security_exploits
https://en.wikipedia.org/wiki/Comparison_of_command_shells
https://en.wikipedia.org/wiki/Computer_hardware
https://en.wikipedia.org/wiki/Credential_stuffing
https://en.wikipedia.org/wiki/Cyber_threat_intelligence
https://en.wikipedia.org/wiki/DICT
https://en.wikipedia.org/wiki/Debian
https://en.wikipedia.org/wiki/Dictionary_attack
https://en.wikipedia.org/wiki/Endpoint_detection_and_response
https://en.wikipedia.org/wiki/File_URI_scheme
https://en.wikipedia.org/wiki/GNU_Compiler_Collection
https://en.wikipedia.org/wiki/Google_hacking
https://en.wikipedia.org/wiki/IDN_homograph_attack
https://en.wikipedia.org/wiki/IPv4_address_exhaustion
https://en.wikipedia.org/wiki/Lightweight_Directory_Access_Protocol
https://en.wikipedia.org/wiki/List_of_DNS_record_types
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
https://en.wikipedia.org/wiki/List_of_file_formats
https://en.wikipedia.org/wiki/List_of_file_signatures
https://en.wikipedia.org/wiki/List_of_hash_functions
https://en.wikipedia.org/wiki/Logic_gate
https://en.wikipedia.org/wiki/MD5
https://en.wikipedia.org/wiki/Monitor_mode
https://en.wikipedia.org/wiki/NetBIOS
https://en.wikipedia.org/wiki/Netwide_assembly
https://en.wikipedia.org/wiki/Pass_the_hash
https://en.wikipedia.org/wiki/Password_cracking
https://en.wikipedia.org/wiki/Public-key_cryptography
https://en.wikipedia.org/wiki/Rainbow_table
https://en.wikipedia.org/wiki/Security_Account_Manager
https://en.wikipedia.org/wiki/Setuid
https://en.wikipedia.org/wiki/Single_point_of_failure
https://en.wikipedia.org/wiki/Stuxnet
https://en.wikipedia.org/wiki/Windows_Registry
https://en.wikipedia.org/wiki/X86_instruction_listings
https://exegol.readthedocs.io
https://exploit-notes.hdks.org
https://fr.wikipedia.org/wiki/Active_Directory
https://gchq.github.io/CyberChef
https://gtfobins.github.io
https://help.shodan.io
https://highon.coffee/blog/penetration-testing-tools-cheat-sheet
https://infinitelogins.com/2021/02/24/linux-privilege-escalation-weak-file-permissions-writable-etc-passwd
https://infosniper.net
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
https://nvd.nist.gov/vuln/full-listing
https://orange-cyberdefense.github.io/ocd-mindmaps
https://osintframework.com
https://owasp.org/Top10
https://pentestmonkey.net
https://portswigger.net/burp/documentation
https://quickref.me/nc
https://search.censys.io
https://shop.hak5.org
https://start.me/p/wMdQMQ/tools
https://talosintelligence.com
https://tryhackme.com/glossary
https://ui.ctsearch.entrust.com/ui/ctsearchui
https://urlhaus.abuse.ch
https://web.archive.org/web/20200901140719/http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
https://wiki.owasp.org/index.php/OWASP_favicon_database
https://www.abuseipdb.com
https://www.cve.org
https://www.dcode.fr
https://www.ettercap-project.org
https://www.exploit-db.com
https://www.hybrid-analysis.com
https://www.joesandbox.com
https://www.kali.org
https://www.linuxkernelcves.com/cves
https://www.mandiant.com/resources/blog/commando-vm-windows-offensive-distribution
https://www.offsec.com/metasploit-unleashed/msfvenom
https://www.rapid7.com/db
https://www.royhills.co.uk/wiki/index.php/Arp-scan_Documentation
https://www.shodan.io
https://www.srihash.org
https://www.tenable.com/cve/newest
https://www.tenable.com/products/nessus
https://www.thehacker.recipes
https://www.vulnhub.com
https://www.wireguard.com

list's People

Contributors

j5py avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.