Th3lazykid
20 | Wannabe hacker | SRT Member | GitHub Campus Expert | Mozilla Campus Club Lead | Host - Security Shorts
Th3lazykid's Stars
dinosn/synack_burp
Tikam02/Bug-Bounty-Resources
Bug-Bounty Resources and Articles
pry0cc/axiom
The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!
six2dez/reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
projectdiscovery/subfinder
Fast passive subdomain enumeration tool.
yassineaboukir/Asnlookup
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
nahamsec/lazyrecon
This script is intended to automate your reconnaissance process in an organized fashion
projectdiscovery/shuffledns
MassDNS wrapper written in go to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard filtering and easy input-output support.
d3mondev/puredns
Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.
Hack-with-Github/Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
TCM-Course-Resources/Practical-Ethical-Hacking-Resources
Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course
indianajson/can-i-take-over-dns
"Can I take over DNS?" — a list of DNS providers and how to claim vulnerable domains.
GitSquared/edex-ui
A cross-platform, customizable science fiction terminal emulator with advanced monitoring & touchscreen support.
NotSoSecure/cloud-service-enum
Voorivex/pentest-guide
Penetration tests guide based on OWASP including test cases, resources and examples.
fdicarlo/eJPT
My notes taken during eJPT labs - in preparation for the exam
hmaverickadams/External-Pentest-Checklist
B3nac/InjuredAndroid
A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
sagishahar/lpeworkshop
Windows / Linux Local Privilege Escalation Workshop
andrew-d/static-binaries
Various *nix tools built as statically-linked binaries
randallkanna/awesome-job-list
A list of the best places to job hunt. I've been curating this for the past 7 years.
s0md3v/dump
Stuff that doesn't deserves its own repository.
s0md3v/be-a-hacker
roadmap for a self-taught hacker
calebstewart/pwncat
Fancy reverse and bind shell handler
A1-exe/twitch2terminal
Read twitch in terminal using node.js
majksec/twitchchat
Termina twitch chat
zephrax/linux-pam-backdoor
Linux PAM Backdoor
areyou1or0/OSCP
OSCP
adambard/learnxinyminutes-docs
Code documentation written as code! How novel and totally my idea!
johnjhacking/Buffer-Overflow-Guide
This Bufferflow Guide includes instructions and the scripts necessary for Buffer Overflow Exploitation. This guide is a supplement for TheCyberMentor's walkthrough. Please watch his walkthrough if you're confused. Feel free to implement Pull Requests or raise Issues.