Coder Social home page Coder Social logo

[zer0x0]'s Projects

pentesting-bible icon pentesting-bible

Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.

pr1 icon pr1

Programmieren 1 Java

pr2 icon pr2

Programmieren 2 Java

pr2_fue icon pr2_fue

Programmieren 2 Java Freiwillige Übungen

purse icon purse

GPG asymmetric (YubiKey) password manager

reverse-engineering icon reverse-engineering

A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.

scripts icon scripts

Some useful scripts I have written or collected

seclists icon seclists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

securityonion icon securityonion

Security Onion 2 - Linux distro for threat hunting, enterprise security monitoring, and log management

sn1per icon sn1per

Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty

spiderfoot icon spiderfoot

SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.

stronghold icon stronghold

Easily configure macOS security settings from the terminal.

thefatrat icon thefatrat

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .

totalrecon icon totalrecon

TotalRecon installs all the recon tools you need

ubertooth icon ubertooth

Software, firmware and hardware designs for Ubertooth

usbkill icon usbkill

« usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.

veil icon veil

Veil 3.1.X (Check version info in Veil at runtime)

watchdog icon watchdog

Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.

wifi-cracking icon wifi-cracking

Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.