ReconDock By Kdairatchi
Go To ReconDock
MyRepo
MyRepo
  • Pastebin Services
  • Awesome Ai Talk
  • Bug Bounty Testing, Techniques, and Tools
  • Cybersources
  • Targets
  • Bug checklist
  • Bug Bounty Platforms
  • Awesome Bug Bounty Tips Awesome
    • CVE Exploits and PoC Collection
  • ============ Awesome Bugs
    • Awesome One-liner Bug Bounty
  • Awesome CS Courses
  • Awesome Cyber Co
  • Awesome Dev
  • Awesome Free Certs
  • Awesome Git
  • Awesome Github
  • Awesome Go
  • Awesome Interviews
  • Awesome Keys
  • Awesome Mac OpenSource
  • Awesome Mac
  • Awesome Python
    • Awesome Tool
  • Awesome-Selfhosted
    • Awesome Hacker Search Engines
  • Awesome Shell
  • Awesome Shodan Search Queries
  • Awesome Static Website Services Awesome
  • Awesome Vulnerable Applications
  • Awesome WAF
  • Awesome First PR Opportunities
  • Awesome-Bugbounty-Writeups
  • Awesome-web3-Security awesome
  • Bug-Bounty
  • CTF Tools
  • Awesome Blockchain Bug Bounty
  • Awesome Bug Bounty
  • awesome-design-systems
  • Awesome Google VRP Writeups
  • Web Scraping
  • awesome
  • bug-bounty-reference
  • the-book-of-secret-knowledge
  • APACHE
  • AWS
  • AZURE
  • CISCO
  • CLOUDFLARE
  • Cross Origin Resource Sharing (CORS)
  • CRLF Injection || HTTP Response Splitting
  • CSV Injection
  • Content Injection
  • CRLF Injection || HTTP Response Splitting
  • JENKINS
  • JIRA
  • LFI
  • OR
  • PostgreSQL Environment Variable Manipulation Vulnerability
  • RCE
  • Recon
  • SSRF
  • Proof OF Concept (POC): SharePoint Vulnerability Detection
  • Template Injection
  • WORDPRESS
  • XSLT Injection
  • XSS
  • XXE
  • Books
  • Firebase Subdomain Enumeration & PoC Testing
  • SQLI
  • Special Tools
  • Account Takeover
  • Authentication
  • Broken Link Hijacking
  • Business Logic Errors
  • Default Credentials
  • Email Spoofing
  • ExposedAPIkeys
  • ForgotPasswordFunctionality
  • JWT Vulnerabilities
  • OWASPTestingChecklist1
  • Tabnabbing
  • Web Cache Poisoning
  • Wordpress Endpoints to look
  • lfi_vulnerble_targets
  • (LFI)passwrd
  • LostSec
  • POCS
    • CVES
      • CVE-2021-36873
      • BreadcrumbsSQL_Injection_cve_2024
      • CVE-2024-0195
      • CVE-2024-29269 Exploit
  • 403-ByPass
  • Chat-bot_xss_payloads
  • burp
    • Match & Replace
    • Zap
  • cloudflare-waf-bypass
  • infosec
    • Customize the bash shell environments
    • automation
    • Website Ideas
  • 2FA bypass
  • Account Takeover
  • OWASP Web Application Security Testing Checklist
  • Projects
  • OWASP Top Ten
  • links
  • Bug Bounty Builder ¯\(ツ)/¯
  • Awesome
    • AllAboutBugBounty: All about bug bounty (bypasses, payloads, and etc)
  • Cheatsheets
  • Checklists
    • Here’s a clear, step by step breakdown of commands, tools, and objectives for each section in your Web Security Testing Guide (WSTG). Each test includes easy to follow commands, explanations, and examples where applicable.
  • Dorks
  • Scripts
  • Loads
  • OWASP
    • Checklist
  • ai
    • Ai Best for Information and Coding
  • Medium Recent Writeups
  • 🌟 Useful Extensions for Bug Bounty Hunting 🌟
  • Customize the bash shell environments
  • Fabric
    • Test Application Platform Configuration
  • Docker
  • Git auto
  • Bug Bounty Beginner's Roadmap
  • Methodology 2025
    • Advanced Recon Methodology
Powered by GitBook
On this page
  • 🛠️ What You’ll Find Here
  • ⭐ Show Your Support
  • 📋 Content
  • ↑ 🛠️ Tools
  • 1. ↑ Utility
  • 2. ↑ Miscellaneous
  • 3. ↑ OSINT
  • 5. ↑ Search Engines
  • 6. ↑ DNS/IP
  • 7. ↑ Post Explotation
  • 8. ↑ Deobfuscators
  • 9. ↑ Decompilers
  • 10. ↑ Disassembler and debuggers
  • 11. ↑ Web
  • 12. ↑ Network
  • 13. ↑ Cryptography
  • 14. ↑ Forensic
  • 15. ↑ Hex editors
  • 16. ↑ Execution logging and tracing
  • 17. ↑ System
  • 18. ↑ Social Networks
  • ↑ 19. Steganographic
  • ↑ 20. Steganalysis
  • ↑ 21. Cryptocurrency
  • ↑ 22. Delete Your Trace
  • ↑ 23. Playbooks
  • ↑ 24. Malware Analysis
  • ↑ 25. SIEM
  • ↑ 26. Password Managers
  • ↑ 27. VPNs
  • ↑ 28. RFID
  • ↑ 29. Bug Bounty
  • ↑ 📖 Learning
  • ↑ 🗂 Resources
  • ↑ 📚 Courses
  • ↑ 📝 Certifications
  • ↑ 🎥 Tutorials
  • ↑ 🚩 CTFs - Training
  • ↑ 🕸️ Practice Webs
  • ↑ 🎤 Events
  • ↑ 🎙️ Podcasts
  • ↑ 👤 Community
  • ↑ 📺 Documentaries
  • ↑ 📖 Books & Papers/Articles
  • ↑ 🖥️ TV Shows
  • ↑ 📙 Open-Source Repositories
  • ↑ 🛣️ Learning Path
  • ↑ 🖌️ Projects Based
  • ↑ 💬 Collaborate
  • ↑ 🪪 Credits
  • Github Links
  • 🛠 Tech Stack
  • 🛠 My Stats

Cybersources

All your best tools and resources on one site!

PreviousBug Bounty Testing, Techniques, and ToolsNextTargets

Last updated 4 months ago

Welcome to the Cybersecurity Resources Repository! This project serves as a central hub for a wide range of tools, resources, and educational materials designed for cybersecurity professionals, enthusiasts, and learners. Whether you're just starting out or an experienced expert, you'll find everything you need to enhance your skills, stay updated with industry trends, and deepen your knowledge in this fast-evolving field.

🛠️ What You’ll Find Here

This repository contains a comprehensive collection of resources, including:

  • Tools: Essential utilities for penetration testing, vulnerability scanning, threat detection, and network security.

  • Tutorials: Step-by-step guides for learning and mastering various cybersecurity techniques.

  • Articles & Research: In-depth educational materials to help expand your understanding of complex topics.

  • Best Practices: Recommendations on maintaining a secure digital environment and following industry standards.

  • Emerging Trends: Insights into the latest cybersecurity threats, technologies, and defense strategies.

⭐ Show Your Support

If you find this repository helpful, please consider giving it a star! Your support helps increase the visibility of the project and encourages others to contribute. Starring the repository helps it grow and ensures that it remains an up-to-date and valuable resource for the entire cybersecurity community.

📋 Content

Tool

Description

Password recovery utility for cracking hashes.

Suite of tools to test the security and privacy of your web browser.

Check if your email address or domain was compromised in global Infostealer malware attacks

CavalierGPT retrieves and curates information from various Hudson Rock endpoints, enabling investigators to delve deeper into cybersecurity threats with unprecedented ease and efficiency.

Full featured unstructured log SIEM/Security Data Lake with raw binary/pcap support

Crawls and monitors .onion sites for specified keywords or changes.

Gathers data from Tor hidden services for analysis or intelligence purposes.

Tool

Description

A resource for locating and investigating individuals.

Facial recognition tool for reverse image searches.

Search engine tailored for OSINT investigations across multiple data types.

Visual global directory of OSINT tools.

Compare facial images to find matches.

Extensive repository of OSINT tools and techniques.

Reverse image lookup specialized in facial recognition.

Find people using names, images, or other details.

AI-powered tool to analyze and extract information from images.

AI-driven platform for reverse image searching.

Collects existing URLs for a domain from sources like Wayback Machine, URLScan, and AlienVault.

Offers gamified training and content for improving cybersecurity awareness.

Framework for designing and executing CTF challenges with a focus on security.

Improves Emacs usability for reading Smali code, aiding Android reverse engineering.

Detailed explanations and solutions for Capture the Flag (CTF) challenges.

Best practices for incorporating security into agile development processes.

A guide to Dalvik VM instructions, useful for analyzing Android applications.

Evaluates and audits AWS resource configurations for compliance and security.

Cyber threat intelligence tool for monitoring and analyzing the dark web.

Tool

Description

Locate usernames across numerous platforms.

Check username availability on various websites.

Free tool to search usernames on 2000+ websites.

Advanced tool for OSINT username searches.

Search for usernames across social networks.

Crawls adult content platforms to search for specific usernames.

Free tool to verify usernames registered on hundreds of sites.

Find usernames on popular social networks.

Collect detailed information on individuals using their username.

Verify usernames on over 90 social media platforms and 30 domain extensions.

Search for domains and usernames across multiple platforms.

Check username and domain availability across social media and websites.

Explore domain name and username availability on popular platforms.

Identify usernames across nearly all social network sites.

Multi-tool for OSINT data management, note-taking, and username checking.

Discover publicly available information tied to a username.

Search for nicknames and usernames on the web within the OSINT domain.

Tools
Description

Offers a variety of tools for investigating email addresses.

Analyze and investigate email addresses.

Verify identities and scan for security risks.

Identify whether email addresses have been leaked.

Explore databases of breached email accounts.

OSINT tool dedicated to email searches.

Locate email addresses and optimize email deliverability.

Troubleshoot and investigate email server issues using free tools.

Prevent account takeovers with breach notifications and data analysis.

Enhance email deliverability, reduce bounce rates, and prevent fraud.

Discover the email formats used by different organizations.

Generate potential email addresses for targeted contacts.

Verify if an email address exists with accuracy.

Investigate Google-related emails and associated documents.

Scan GitHub repositories for exposed emails and names.

Perform local or premium email OSINT and password breach hunting.

Check whether an email address has been exposed in data breaches.

Discover accounts linked to email addresses across various platforms.

Find email addresses quickly and connect with business contacts.

Search over 7.5B breached entries for emails, usernames, and other data.

Monitors stealer logs to identify compromised domains and email addresses, providing real-time alerts and proactive protection against breaches.

A Telegram bot that allows you to search people's names in more than 3000 websites.

Tools
Description

Geospatial intelligence and analysis.

Geospatial OSINT tools.

The World's Best AI Geolocation Tool

We find where a photo has been taken in the world using Artificial Intelligence.

IP Logger link shortener with geolocalizaction with advanced analytics.

The GeoNames geographical database with over 11 million placenames.

Search over 3.5 million spatial GIS datasets hosted on over 40k live services.

Custom Google search for geographical-related queries.

Public data archive with over 40 years of imagery and scientific datasets.

Cross-agency collaborative effort for geospatial data sharing and transparency.

Collection of geographical maps from the FAO.

Geolocation OSINT tool for gathering location data from social networks.

In-depth coverage of political violence trends in the US.

Provides live information about public schools, traffic, bike shares, etc.

Query and visualize protests worldwide with spatial aggregations.

A collection of geospatial intelligence workflows implemented in Python.

Ways I use ChatGPT with OverpassTurbo for OSINT Geolocation Research

Tools
Description

News and search engine tools.

IT Security Guru is a top resource for the latest cybersecurity news, covering threats, data breaches, and expert insights to help you stay informed and secure.

Tools
Description

Search for people's information.

Aggregate search for personal information.

Official USA search tools.

Search for people in the USA.

Comprehensive search for personal information.

Search engine for Internet-connected devices.

Tool for link analysis and data visualization.

An OSINT automation tool.

A tool to filter and refine search results based on specific needs.

Search engine for scholarly articles, theses, books, and other academic resources.

Microsoft’s search engine with intelligent features and integrated services.

Popular Russian search engine offering web, image, and video search capabilities.

Privacy-focused search engine combining results from multiple indexes.

Privacy-oriented search engine that doesn’t track user activity.

Privacy-friendly search engine offering anonymous browsing.

Anonymous search engine that protects user privacy and filters inappropriate content.

Privacy-respecting search engine with a European origin.

Eco-friendly search engine that uses ad revenue to plant trees worldwide.

Independent search engine with a no-tracking policy.

Privacy-centric search engine integrated with the Brave browser.

Yahoo’s search engine offering web, image, and video search.

China’s leading search engine.

Metasearch engine that aggregates results from multiple search engines.

A search engine that filters out top-ranked websites for deeper web discovery.

Combines results from multiple search engines into a unified format.

Organizes search results into topic-based clusters for better navigation.

Combines a search engine with a news feed.

Directory of search engines for different countries worldwide.

Access cached versions of web pages from various sources.

The largest free digital library of books.

Allows simultaneous Google searches in two languages.

Search Tor, I2P, data leaks, domains, and emails.

Assessing attack surface for internet-connected devices.

Scans the internet for threat intelligence.

Marketing and affiliate marketing research.

Extensive threat intelligence feed.

Search public S3 buckets.

Scan files and URLs for threats.

Browse latest vulnerabilities and exploits.

Search for devices connected to the internet.

Collects cyber-threat intelligence data.

Search and monitor internet-connected assets.

Search for email addresses belonging to a website.

Gather information about targets.

Search for threat intelligence.

Search vulnerabilities in a large database.

Search for certs that have been logged by CT.

Extensive DNS data.

Search and discovery attack surfaces.

Search across a half million git repos.

Search for devices connected to the internet.

Search for DNS records quickly.

Archive of various exploits.

Search 75 billion lines of code from 40 million projects.

Search publicly indexed information.

Really fast Google dorking.

Database of wireless networks, with statistics.

Free service to scan and analyze websites.

View content from deleted websites.

View leaked credentials.

Search for various threat intelligence.

Open-source framework for web scanning and recon, useful for dark web investigations.

Tool to search for .onion services across the dark web.

Command-line search engine for exploring the dark web.

Search engine for Tor Hidden Services on the dark web, with a public GitHub repo.

Powerful search tool designed for discovering .onion websites on the dark web.

Automates crawling and searching for data across .onion sites.

Distributed and automated .onion site crawler for large-scale data collection on the dark web.

Advanced dark web crawler tailored for extracting and analyzing data from .onion sites.

Tools
Description

Multithreaded Perl script for DNS enumeration and identifying non-contiguous IP blocks.

Tool for subdomain enumeration using data sources, brute force, web archives, and machine learning.

Advanced subdomain discovery service with a fast, user-friendly API.

Automatically collects subdomains from various online sources.

Enumerates subdomains, including hidden ones, by analyzing certificate transparency logs.

List of subdomains from the top 1 million domains, ideal for large-scale enumeration.

Subdomain list gathered by Shubs, valuable for reconnaissance purposes.

Curated list of subdomains by Jhaddix, tailored for penetration testing.

Explore DNS records, WHOIS data, SSL/TLS certificates, subdomains, and more.

Search for domain IPs, IPv4, IPv6, or associated providers.

Scan for phishing domains and related risks.

Search for domain names, IPs, keywords, or hostnames to assess cybersecurity risks.

View open ports and device types linked to specific IP addresses.

Identify internet scanners and common business activities in your security logs.

Explore internet-connected devices for reconnaissance and vulnerability analysis.

A freemium tool for security reconnaissance, scanning for vulnerable devices online.

Assess the attack surface of internet-connected devices and platforms.

Perform reverse IP and Whois lookups to find hosted websites and domain owner details.

Access service probe records from a large-scale 2012 internet scan.

Cyber defense search engine that indexes exposed assets from the internet and dark web.

Test for leaks in your IP address, DNS, and WebRTC during online activity.

Research IP numbers, domains, and other online assets for deeper analysis.

Identify the technology stack behind any website, including CMS, e-commerce, and more.

A fast web crawler designed for OSINT (Open Source Intelligence) collection.

Check which technologies a website is built with, including frameworks and tools.

Discover the technologies used to build any website, from CMS to hosting platforms.

A suite of OSINT tools for comprehensive information gathering.

Analyze network infrastructure and devices using Nmap’s powerful scanning features.

Offers network diagnostics such as traceroute, nslookup, ping, and DNS lookups.

Reports on HTTPS encryption across the web.

Lookup and analyze SSL certificates and their associated domains.

Search and analyze SSL certificates for cybersecurity insights.

Scan for exposed internet services and find relevant vulnerabilities.

A tool to scan and analyze websites, recording all interactions during page navigation.

A free DNS research tool that identifies hosts related to a domain for security analysis.

Perform private investigations and legal case research, including digital piracy analysis.

Analyze website traffic sources and compare competitors’ online performance.

Access a network reputation database to find malicious IP addresses.

Discover domain names based on keyword searches.

Provides delegation details for top-level domains (TLDs) like .com, .uk, and more.

Search for vulnerable websites to assess security risks.

Offers various OSINT tools without requiring an API key for access.

Gather information about URLs, such as SSL certificates, IP, and metadata.

A database of malicious files, IPs, and domains collected from honeypots.

Open Source Active Directory ACL Visualizer and Explorer.

Tools
Description

A post exploitation framework for powershell and python.

A post exploitation tool that uses iron python to get past powershell restrictions.

A PowerShell post exploitation framework.

Framework for Making Environmental Keyed Payloads.

Tools
Description

Web service guessing JS variables names and types based on the model derived from open source.

.NET deobfuscator and unpacker.

Tools
Description

Decompiler for the over 20 releases and 20 years of CPython.

A OS X and Linux Disassembler/Decompiler for 32/64-bit Windows/Mac/Linux/iOS executables.

The best decompiler I have used. Is able to decompile apps written in Scala and Kotlin into Java code. JD-GUI and Luyten have failed to do it fully.

.NET assembly editor, decompiler, and debugger

An open-source .NET assembly browser and decompiler

A free-of-charge .NET decompiler from JetBrains

Decompiler for Android apps. Not related to JAD.

JAD Java Decompiler (closed-source, unmaintained)

One of the best, though a bit slow, hangs on some binaries and not very well maintained.

Decompiler plugin for radare2

LLM-based decompiler for radare2

Tools
Description

Multi-platform disassembler and debugger for Windows, Linux, and macOS.

32-bit assembler-level debugging tool for Windows.

Interactive disassembler for x86, ARM, and MIPS, with indented pseudo-code and syntax coloring.

Portable and versatile reverse engineering framework.

Graphical interface for the radare2 reverse engineering framework.

Open-source debugger for x64 and x32 applications on Windows.

Customizable and hackable disassembler with support for IDAPython-compatible plugins.

Comprehensive reverse engineering suite developed by the NSA.

Web
Description

A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services (API and scraping).

Web reconnaissance framework for gathering OSINT.

Data gathering service offering detailed information on IPs, domains, ports, technologies, and more through OSINT.

Tool for bug hunting or penetration testing to find exposed .git repositories.

Key and secret auditing tool that checks secrets against multiple SaaS platforms.

Virtual host scanner that performs reverse lookups and detects dynamic default pages, aliases, and catch-all configurations.

Search engine for finding servers and devices connected to the internet.

Tool for discovering valid subdomains through passive online sources.

Automatic SQL injection tool for database takeover.

Website reputation checker that scans URLs for safety using multiple security engines and blocklists.

Tools
Description

Network Forensic Analysis Tool (NFAT) for analyzing network traffic.

Java-based HTTP/HTTPS proxy for web application vulnerability assessment.

Linux-based packet crafting tool.

Simple TCP/UDP protocol fuzzer for vulnerability testing.

Tool for exploring autonomous systems with related data (CIDR, ASN, Org).

Integrated penetration testing tool for identifying vulnerabilities in web applications.

Man-in-the-middle SOCKS proxy for Java.

SSH/SFTP man-in-the-middle tool for logging sessions and passwords.

Security scanner for network exploration and vulnerability scanning.

Script to route traffic through the Tor network.

Python toolkit for network hacking.

Program to jam all Wi-Fi clients in range.

HTTP session hijacking attack tool.

Python tool for creating and manipulating network packets.

Subdomain enumeration tool with scraping, brute forcing, crawling, and reverse DNS capabilities.

Multithreaded secure packet sniffer.

Tool for discovering internet-wide misconfigurations using zgrab2.

Fast port scanner using Rust, designed for quick scanning and integration with Nmap.

Extensible TCP/UDP proxy for traffic analysis and modification with SSL/TLS support.

Python-based tool to crawl .onion websites efficiently.

A dark web crawler designed for flexibility and integration with analysis tools.

Tools
Description

A tool to analyze multi-byte XOR cipher

A fast password cracker

Aircrack is 802.11 WEP and WPA-PSK keys cracking program.

Automated decryption tool using artificial intelligence & natural language processing.

Tools
Description

Digital forensics platform and graphical interface for The Sleuth Kit and other tools.

A collection of command-line digital forensics tools and library.

Suite of digital investigation products by Guidance Software.

Malware hunting tool for analysis and detection.

Brazilian Federal Police forensic investigation tool.

NTFS forensic image collector for forensic investigations.

Ubuntu-based tool that provides a complete forensic environment with a graphical interface.

Framework for memory forensics and analysis of volatile memory.

Host investigation and data acquisition tool.

Memory analysis and forensics framework.

Tool for creating timelines for forensic analysis.

Automated DFIR software for investigating malware, ransomware, and account takeovers.

Tool to extract forensic data from Firefox, Iceweasel, and Seamonkey browsers.

Framework for orchestrating forensic collection, processing, and export.

Open-source tool for analyzing disk images and file systems.

Framework for extracting data from volatile memory for system state analysis.

Digital forensics platform for comprehensive incident response.

Data recovery software for recovering lost partitions and undeleting files.

Universal hex editor for forensics, data recovery, and IT security tasks.

Open-source tools for forensic artifact and image analysis.

Tool for collecting and parsing Windows artifacts for digital forensics.

Library for accessing and parsing Windows NT Registry files.

Powerful framework for reverse engineering and binary analysis.

Anti-forensic Linux kernel module that acts as a USB port kill-switch.

Tool for fixing acquired Windows Event Log files.

DFVFS-backed viewer for file extraction and viewing.

Forensic tool for gathering traces from Android and iOS devices.

Framework for automating forensic processing in cloud environments.

Comprehensive digital forensics and incident response platform.

Library for parsing Windows Event Logs for forensic analysis.

An open-source digital image forensic toolset.

Kuiper is a digital investigation platform that provides a capabilities for the investigation team and individuals to parse, search, visualize collected evidences.

The key tool for forensic analysis of Windows DAT.

Tools
Description

A hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size

A hexadecimal editor, helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security

Tools
Description

A free and open-source packet analyzer for network protocol analysis.

A powerful command-line packet analyzer, along with libpcap for network traffic capture.

An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface.

A cross-platform GUI web debugging proxy for viewing intercepted HTTP and HTTPS/SSL live traffic.

USB capture tool for Linux, used for monitoring USB traffic.

USB capture tool for Windows, useful for monitoring USB traffic.

A tool for structure recovery via dynamic instrumentation.

A tool for tracing shared library calls.

Detailed research on using CMSTP.exe for bypassing security restrictions and executing arbitrary code.

Explains one-liner PowerShell commands for downloading and executing malicious payloads.

Demonstrates techniques for bypassing AppLocker and executing commands with PowerShell diagnostic scripts.

A case study on exploiting Windows Script Host (WSH) injection for command execution.

Introduction to using Gscript as a dropper tool in red team operations.

Tools
Description

A computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

A tool for Windows security that can extract plaintext passwords, hashes, and other secrets from memory.

A YouTube playlist offering tutorials on various hacking tools.

A list of common OBEX (Object Exchange) paths, useful for targeting OBEX servers.

A list of rare OBEX (Object Exchange) paths, useful for targeting OBEX servers.

A fast file and folder search tool for Windows, allowing instant results with minimal system resource usage.

Tools
Description

Instagram Search Tool

Instagram marketing tool for managing and growing your account.

Tool for selecting random winners from comments.

Tool for finding hashtags related to your content.

Chrome extension for downloading photos and videos from Instagram.

Tool for calculating engagement rates on Instagram.

Tool for exporting Instagram comments.

Tool for finding and analyzing hashtags.

Tool for finding the best hashtags for Instagram.

Tool for analyzing the authenticity of influencers and their engagement.

Tool for managing and analyzing Instagram accounts.

Tool for finding Instagram influencers.

Tool for searching and downloading Instagram photos.

Tool for viewing and downloading Instagram stories anonymously.

Tool for finding the best tags for your Instagram posts.

Chrome extension for posting photos and stories on Instagram from desktop.

Tool for gaining followers and engagement on Instagram.

Tool for scraping Instagram data.

Tool for exploring Instagram profiles and posts.

Open-source intelligence tool for Instagram.

Tool for scraping Instagram posts and profiles.

Tool for searching Instagram profiles and posts.

Tool for downloading Instagram photos, videos, and metadata.

Tool for tracking Instagram locations.

Tool for downloading photos and videos from Instagram profiles.

Tool for tracking and analyzing social media campaigns.

Tool for finding the best hashtags for Instagram posts.

Tool for generating and analyzing hashtags.

Tool for Instagram analytics and reporting.

Tool for Instagram data analysis.

Tool for Instagram OSINT.

OSINT tool for analyzing Instagram profiles and posts.

Tool for finding Instagram user IDs.

Tool for scheduling and managing Instagram posts.

Automation tool for social media platforms.

Tool for searching and organizing Instagram content.

Tool for Instagram OSINT and data scraping.

Tool for tracking Instagram activity.

Tool for setting up social media alerts.

Tool for social media analytics and competitive analysis.

Tool for extracting social media IDs.

Tool for Instagram OSINT.

Tool for scheduling and managing Instagram posts.

Tool for downloading Instagram profile pictures.

Tool for influencer marketing and analytics.

Instagram web viewer and search tool.

A tool for exploring public stories, posts, reels, tags, followers, and more..

A tool to find the Instagram user ID for any profile.

Tools
Description

LinkedIn search tool by IntelligenceX.

Tool for OSINT on LinkedIn profiles.

LinkedIn enumeration tool.

Tool for reverse email lookup on LinkedIn.

Comprehensive people search tool.

Chrome extension for LinkedIn OSINT.

Collection of OSINT tools for LinkedIn.

LinkedIn enumeration tool.

Bookmarklet tools for LinkedIn OSINT.

Tool for scraping LinkedIn profiles.

Tool for searching LinkedIn profiles.

LinkedIn intelligence and OSINT tool.

Support tools for LinkedIn OSINT.

Automation tool for LinkedIn tasks.

LinkedIn enumeration and scraping tool.

Tool for recruiting on LinkedIn.

LinkedIn search tool for recruiters.

Tool for scraping LinkedIn profiles.

Tools
Description

Tool for analyzing TikTok profiles and videos.

Tool for finding the best hashtags for TikTok posts.

Tool for analyzing the authenticity of TikTok influencers.

Tool for finding TikTok influencers.

Tool for finding TikTok user IDs.

Tool for managing and analyzing TikTok campaigns.

Quick search tool for TikTok profiles.

Tool for downloading TikTok videos.

Bookmarklet tools for TikTok OSINT.

Tool for downloading TikTok videos.

Tool for analyzing TikTok profiles and content.

API for interacting with TikTok.

Tool for finding trending hashtags and content on TikTok.

Tool for downloading TikTok videos.

Tool for generating TikTok hashtags.

Tool for scraping TikTok profiles and videos.

Tool for analyzing timestamps on TikTok videos.

Tool for searching TikTok profiles and content.

Tool for stock and analyzing TikTok videos.

Tool for downloading TikTok videos.

Tool for analyzing TikTok and YouTube content.

Tool for analyzing TikTok profiles and content.

Tools
Description

Tool for analyzing OnlyFans metrics.

Search tool for finding OnlyFans profiles.

Tool for finding OnlyFans creators.

OnlyFans search tool.

Tool for finding similar OnlyFans profiles.

Comprehensive search tool for OnlyFans.

Tools
Description

A collection of all-in-one tools for Discord.

A tool for tracking and saving chat histories in Discord.

A platform to discover and list Discord servers.

A collection of publicly available Discord bots created by community members, serving various functions.

An unofficial tool for looking up Discord user information.

A vast collection to explore millions of Discord bots for different purposes.

A curated selection of popular and interesting public Discord servers.

A site for finding public Discord servers and bots.

Provides resources for conducting research and OSINT investigations related to Discord accounts, servers, and bots.

A comprehensive directory of top Discord bots, apps, and servers, including popular music and economy bots.

Tools
Description

Tool for viewing follower lists on Twitch.

Tool for tracking Twitch statistics and analytics.

Tool for analyzing Twitch stream statistics.

Tool for filtering and previewing Twitch streams.

Tool for downloading Twitch videos.

Tool for analyzing viewer overlap between Twitch streamers.

Tool for viewing Twitch chat logs.

Tool for recovering deleted Twitch videos.

Database for tracking Twitch followings.

Tool for analyzing Twitch trends and statistics.

Tool for checking how long users have been following a Twitch channel.

Tools
Description

Social discovery and dating app.

Dating app where women make the first move.

Dating app that curates matches for users.

Dating site focused on long-term relationships.

Social networking app for gay, bi, trans, and queer people.

Dating app that shows users people they've crossed paths with.

Dating and social app for LGBTQ+ women and non-binary people.

Dating app for single parents and those open to dating them.

Dating app designed to be deleted.

Exclusive dating app for ambitious professionals.

Dating app for professionals.

One of the largest dating sites.

Social discovery app for meeting new people.

Dating app with a detailed questionnaire for matching.

Dating site with a large user base.

Social app for gay, bi, trans, and queer people.

Dating app that matches people based on music taste.

Popular dating app for meeting new people.

Dating site with a behavioral matchmaking algorithm.

Tools
Description

A comprehensive list of 110 steganographic tools.

A tool for disguising data to bypass data loss prevention mechanisms.

A steganography-based dropper written in Python.

A cross-platform application for steganography.

Deep learning based steganography tool.

A Python-based steganography tool.

A steganography tool using JavaScript.

A simple steganography tool.

A proxy tool that implements steganography.

A video steganography tool to prevent piracy.

An open-source steganography tool.

Another steganography tool.

A steganography tool for Facebook messages.

A tool for hiding data within PDF files.

A presentation on steganography.

A tool for hiding data within ASCII text.

A tool for audio steganography.

A tool for hiding data within retweets.

Another steganography tool.

A simple steganography tool.

A universal steganography tool.

A neural network based steganography tool.

A steganography tool for hiding data in audio files.

A tool for MP3 steganography.

A steganography tool written in Java.

A tool for least significant bit steganography.

A steganography tool written in Go.

A collection of steganography tools.

An implementation of the F5 steganography algorithm.

A steganography tool.

A deep learning based steganography tool.

A tool for audio steganography.

Algorithms for audio steganography.

A steganography tool.

A steganography tool for Android.

A steganography tool.

A tool for hiding data in PNG images.

A steganography tool for hiding data in chess games.

Another steganography tool.

A steganography tool for images.

A steganography tool.

A steganography tool for Facebook messages.

A steganography tool.

A tool for MP3 steganography.

A video steganography tool.

A steganography tool.

A tool for embedding exploits in images.

A steganography tool.

A collection of steganography tools from 2014.

A tool for covert channels based on time.

A tool for covert communication.

A steganography tool.

A tool for covert channels in the cloud.

A tool for data exfiltration via DNS.

A source for various steganography tools.

A steganography tool.

A steganography tool using Unicode.

Another steganography tool.

A steganography tool for binary files.

A steganography tool.

Source code for a steganography tool.

Steganography algorithms.

A simple steganography tool.

An introductory guide to steganography.

A tool for embedding PowerShell scripts in images.

A tool for steganography in Instagram images.

Tool
Description

A steganographic tool that helps in hiding and detecting messages within digital images.

A comprehensive guide on various steganography techniques and tricks used in cybersecurity.

A tool for detecting hidden data in PNG and BMP files.

An online tool for hiding and extracting hidden messages in images.

A steganography analysis tool that can analyze images for hidden data.

A tool for brute-forcing passwords of hidden data in steganographic images.

A lightning-fast steganography brute-force tool for hidden data in images.

A resource for various steganalysis techniques and tools.

An informative site on steganography tools and techniques.

A popular steganography detection tool capable of detecting hidden data in images.

A tool designed to detect steganography usage and hidden data.

A steganography kit used for hiding and extracting hidden messages in images.

A tool designed for detecting and analyzing steganographic content in digital images.

A suite of tools for hiding and detecting steganographic content.

An open-source steganography tool for embedding and extracting hidden messages in images.

A tool for detecting hidden data in images using statistical analysis.

A blog post discussing steganography in the context of the TV show Mr. Robot.

A research paper on forensic analysis of video steganography tools.

A tool for image steganalysis using state-of-the-art machine learning techniques.

A collection of research papers on steganalysis and related topics.

A project for steganalysis using convolutional neural networks (CNN) for same key images.

Deepsteg performs visual, structural, and statistical attacks (including deep learning-based attacks) to detect files hidden within images and other files.

A project for steganalysis of audio files using TensorFlow.

A steganalysis project using convolutional neural networks (CNN).

A large-scale image steganalysis dataset.

A large-scale image steganalysis dataset.

An online tool for hiding and extracting hidden messages in images.

A tool for steganography analysis.

A steganography analysis tool.

A project for universal deep steganalysis systems.

A project on breaking steganalysis using generative adversarial networks (GAN).

A steganalysis tool.

A tool for brute-forcing passwords of hidden data in steganographic images.

A steganography analysis tool.

A collection of free steganography tools provided by McAfee.

A steganography analysis tool.

A steganography tool for hiding and extracting hidden messages in images.

A steganography analysis tool.

A steganalysis project.

A project for steganalysis using YeNet and PyTorch.

A steganalysis project using convolutional neural networks (CNN) - Yedroudj-Net.

A project for steganalysis using SRNet and PyTorch.

A toolkit for steganography using least significant bit (LSB) techniques.

A project for steganalysis using convolutional neural networks (CNN).

A steganography and steganalysis toolkit.

A project for steganalysis using deep learning techniques.

A project for steganalysis of audio files.

A project for steganalysis of audio files using convolutional neural networks (CNN).

A steganalysis tool for detecting hidden data in images using deep learning techniques.

A steganography analysis tool.

Tool
Description

This site provides blockchain explorers for several crypto-currencies.

Platform that connects your crypto wallets

Receive alerts for significant cryptocurrency price changes.

Blockchain explorer and analytics for various cryptocurrencies.

Explore Bitcoin's blockchain, tracking all transactions in its public ledger.

Etherscan is a comprehensive block explorer and analytics platform for Ethereum.

A platform offering various services, starting with Bitcoin blockchain exploration.

A blockchain explorer that provides additional information not found elsewhere.

Custom Google search engine focused on Bitcoin forums and discussions.

Tool for verifying and checking the validity of cryptocurrency addresses.

Real-time customizable price alerts for cryptocurrencies, stocks, and coins.

Tool
Description

Delete all you comments, likes... of your social acounts.

Delete your information on all your accounts.

Delete your information of databrokers.

Delete your accounts.

Tool
Description

A guide for handling compromised accounts.

Playbook for critical incidents requiring immediate attention.

Steps for addressing data loss incidents.

Playbook for responding to malware infections.

A guide for investigating phishing attacks.

Playbook for handling ransomware incidents.

Templates for incident tracking in Hive.

Tool
Description

Creates Yara signatures from malware to identify similar samples.

Interactive malware sandbox for real-time analysis and threat intelligence.

Bluetooth honeypot for monitoring and capturing malicious activity.

Signature-based YARA rules for detecting threats across multiple platforms.

Automatically generates YARA rules for malware repositories.

Platform for uploading, searching, and downloading malware samples.

In-depth threat intelligence reports and services.

SAST and malware analysis tool for Android APKs.

Static analysis framework for extracting key characteristics from files.

Tool for automatic analysis of malware behavior using machine learning.

Multithreaded YARA scanner for incident response or malware zoos.

A deep analysis tool for malicious files using ClamAV and YARA rules.

Tool to decompress malware samples for running YARA rules.

Generates YARA rules for various string and encoded malware variations.

Automatically generates AV byte signatures for similar binaries.

Provides in-depth static and dynamic analysis of files.

A simple DOM-based XSS vulnerability scanner.

Powerful open-source XSS scanner for automation.

Python wrapper for Libemu for shellcode analysis.

Management portal for LoKi scanner with a centralized database.

Yara module for Node.js for scanning with Yara rules.

Analyzes malicious network traffic to detect malware activity.

Yara bindings for Rust supporting various features like rule compilation.

A tool for creating YARA rules quickly to isolate malware families.

A machine learning tool for ranking strings for malware analysis.

AI-based IT security platform for identifying and stopping advanced malware.

Generates YARA rules by extracting strings from malware files.

Automated malware analysis and detection in an isolated environment.

Tool to detect and exploit Blind XSS vulnerabilities.

Finds Cross-Site Scripting (XSS) vulnerabilities in web applications.

Instantly find exploits from local and online databases.

Tool for testing and exploiting XSS vulnerabilities.

Java decompiler supporting features up to Java 14.

Framework for reverse engineering Flutter apps.

A debugger for reverse engineers and security analysts.

Dynamic binary analysis library with emulation capabilities.

Distributed Python system to help hunt for new malware using Yara rules.

Sandbox for analyzing Android malware.

Automates cybersecurity reporting with open-source tools and templates.

Cloud-native security platform for detecting and preventing security threats.

A simple XSS scanner for detecting vulnerabilities.

Searches Git repositories for sensitive data.

Python script to test for JWT vulnerabilities.

Fuzzes query strings to identify security vulnerabilities.

A collection of XSS payloads for exploiting web vulnerabilities.

A tool for exploiting and testing XSS vulnerabilities in web apps.

A reverse engineering tool for Windows executable analysis.

Malware detection and prevention for advanced cyber threats.

Malware analysis platform with advanced threat detection.

Malware analysis tool that helps distribute files for analysis.

Management portal for Yara rule-based malware scanning.

Malware sandbox designed for executing and analyzing malicious files.

Tool
Description

A cybersecurity platform that integrates with SIEM solutions for centralized threat management.

Resource
Price
Description

Free

Available on windows, linux, mac, IOS and Android.

Resource
Price
Description

5€/month

A privacy-focused VPN service that offers anonymous internet browsing with no personal information required for registration.

Free & Paid (Subscription)

A secure VPN service that prioritizes privacy, offering both free and premium plans with strong encryption and no-logs policy.

Paid (Subscription)

A privacy-focused VPN service offering strong encryption, a strict no-logs policy, and advanced features like multi-hop VPN for enhanced security.

Tool
Description

A powerful tool for reading, writing, and analyzing RFID and NFC cards.

An RFID emulator for security analysis.

A versatile multi-tool device for interacting with RFID, NFC, and other protocols.

A USB-based NFC reader and writer commonly used for RFID development and testing.

An open-source library for using NFC readers and performing RFID interactions.

A mobile app for interacting with MIFARE Classic cards, reading, writing, and analyzing their data.

A tool for analyzing smart cards, including Calypso-based transit cards, with a focus on data parsing and visualization.

A mobile app for reading and analyzing transit cards, providing insights into metro card data.

A Flipper Zero app for reading and parsing metro cards, inspired by Metrodroid. It supports multi-protocol card reading and global transit card analysis.

A Flipper Zero application to interface with a SAM from the Flipper Zero over UART

A Flipper zero application for writing to NFC tags with modifiable sector 0

MFOC is an open source implementation of "offline nested" attack

Tool
Description

A versatile form builder for websites and mobile applications.

A platform to connect designers with clients needing logos, websites, and more.

A tool for simplifying expense reporting and tracking for businesses.

Cloud-based solutions for managing and optimizing digital experiences on Drupal.

A customer experience automation platform for email marketing and CRM.

A SaaS platform to automate lead acquisition and qualification processes.

Industry-leading software solutions for creative professionals, including Photoshop and Acrobat.

A private cloud collaboration tool for secure team file sharing.

A secure Bitcoin wallet and platform for decentralized applications.

A platform for booking short-term homestays and unique travel experiences.

A search and discovery API for websites and mobile applications.

A platform for creating free blogs and websites with monetization options.

Italy’s largest consumer organization offering product reviews and advice.

A tool for creating and managing subtitles for videos collaboratively.

A comprehensive cloud platform offering computing power, storage, and other services.

The world’s largest online retailer offering a vast array of products and services.

Solutions for creating and delivering on-demand learning and performance support.

A music streaming platform focused on Arabic content.

A Bitcoin trading and exchange platform.

An open-source HTTP server for hosting websites and applications.

A cross-platform mobile app development tool.

A global leader in consumer electronics, software, and online services.

A platform for mobile app engagement and customer feedback.

A security and compliance platform for DevOps teams.

A digital audio workstation for recording, editing, and mixing sound.

A blockchain wallet and API service for developers.

A platform for IoT device development and deployment.

A project management tool for team collaboration and task tracking.

A global bug bounty and vulnerability disclosure platform.

A leading European platform for crowdsourced security testing.

A vulnerability coordination and bug bounty platform connecting businesses with hackers.

A platform offering managed bug bounty programs and vulnerability disclosure.

A pen-testing as a service platform with a global community of security experts.

A funding platform for open-source projects and software development bounties.

A platform for launching bug bounty programs with a community of ethical hackers.

A platform for developers to earn rewards by solving coding challenges.

A funding platform for open-source software improvements and bug fixes.

A platform for funding free and open-source software development.

A crowdsourced security platform combining automation with a network of ethical hackers.

A bug bounty and vulnerability coordination platform for businesses.

A SaaS platform offering web vulnerability scanning and crowdsourced security.

A Japanese platform for launching and managing bug bounty programs.

A vulnerability coordination platform for organizations to work with ethical hackers.

A community platform for ethical hackers to collaborate and find bug bounty opportunities.

A security platform for crowdsourced vulnerability assessments and bug bounties.

A Slovak bug bounty platform for finding vulnerabilities in digital assets.

A bug bounty and penetration testing platform based in Asia.

A cybersecurity and bug bounty platform for coordinated vulnerability disclosure.

Resource
Description

Wikipedia form AddieLamarr of his 14 years cyber carrer.

A readme.md about PowerShell Commands and learning.

We will unravel the secrets of PowerShell for Quick Guide Hackers and strengthen your skills in the world of hacking!

DuckyScript™ is the programming language of the USB Rubber Ducky™, Hak5® hotplug attack gear and officially licensed devices. The quick reference to start programming with ducky.

Document that explains how badusb works on Flipper Zero

Project that aims to guide those new to Open Source Intelligence (OSINT)

Diagram of diferent types of attacks on OSINT.

NFC Forum, NFC data mapping, MIFARE Classic 1K/4K, MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Plus X/S, NFC Type MIFARE Tag

Complete list of security related operating systems

Description of main penetration testing distributions

Website dedicated to talking about, reviewing and keeping up to date with open source operating systems

Collection of cheat sheets useful for pentesting

The world’s largest open-source open-data library. Mirrors Sci-Hub, Library Genesis, Z-Library, and more.

PDF Drive is your search engine for PDF files.

125 PowerShell scripts designed to simplify daily administrative tasks, enhance reporting, and streamline auditing processes.

Learn what makes successful hackers thrive in the world of bug bounty hunting.

A comprehensive guide by Bugcrowd on becoming a bug bounty hunter.

A beginner's guide to getting started with bug bounty hunting.

An insightful Q&A on the experiences of a bug bounty hunter.

A curated list of bug bounty cheatsheets and tools.

Step-by-step methodology to begin your bug bounty journey.

Courses
Description

CS50’s Introduction to Computer Science. Even if you are not a student at Harvard, you are welcome to “take” this course for free via this OpenCourseWare by working your way through the course’s eleven weeks of material.

The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games.

HTB Academy is cybersecurity learning the HTB way.

Hack The Box is a training platform where you can find matchines and CTFs to practice.

Plataform where there are open online courses.

TryHackMe goes way beyond textbooks and focuses on fun interactive lessons that make you put theory into practice.

Get started with a free account and gain immediate access to 20+ complete cybersecurity courses from the creators of the Certified Ethical Hacker (CEH) program.

Plataform to learn with courses orientated to the blue team.

Offers free and paid courses with hands-on labs for certificatitions like Security+, CISSP and CEH.

Affordable courses with video lectures, quizzes, and practice exams for various certifications.

Free video lessons and practice exams for CompTIA certifications.

Free course that teaches a beginner how security works in the real world. Learn security theory and execute defensive measures so that you are better prepared against threats online and in the physical world.

Malware analysis.

A CTF (Capture The Flag) platform for practicing hacking and learning real-world cybersecurity skills.

Online security courses.

Advanced malware sandboxing.

IP address threat intelligence.

Bug bounty platform.

Crowdsourced cybersecurity.

Open-source bug bounty program.

Hands-on blue team exercises.

We are Sharing the Knowledge for Free of Charge and Help Students and Learners all Over the World.

All hacking courses for free.

Free Introduction of CIS

34€ Ultimate CISSP Exam Prep with Practical Practice Tests and Expert Explanations Designed for Guaranteed Success!

A YouTube playlist providing a detailed course on red team operations.

A comprehensive guide and course on advanced threat tactics by Cobalt Strike.

A video session from FireEye that covers red team operations and assessments.

Certifications
Description

Validate your knowledge and skills in network fundamentals and access, IP connectivity, IP services, security fundamentals, and more.

CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.

Certified in Cybersecurity (CC) from ISC2

PEN-200 (PWK) is our foundational pentesting course where students learn and practice the latest techniques.

Learn Foundational Wireless Network Attacks to advance your skills in network security red-teaming

Learn advanced techniques including bypassing security mechanisms and evading defenses.

eJPT is a hands-on, entry-level Red Team certification that simulates skills utilized during real-world engagements.

Certification focusing on simulated attack scenarios and advanced penetration testing techniques.

Designed for managing and overseeing simulated attack engagements effectively.

A SANS course covering red team methodologies and threat emulation tactics.

Advanced penetration testing certification from eLearn Security.

Practical certification emphasizing hands-on red team operations.

Expert-level certification in advanced red teaming strategies and tools.

Certification focusing on enterprise security and defense evasion techniques.

Tutorials
CTFs
Category
Description

OSINT

Imagine diving headfirst into captivating OSINT scenarios that mirror real-world investigations. You must apply OSINT techniques to solve intricate cases and mysteries.

OSINT

The Trace Labs Search Party CTF is a non theoretical, gamified effort that allows for the crowdsourcing of contestants to perform a single task: Conduct open source intelligence operations to help find missing persons

OSINT

A room to understand how to geolocate images

OSINT

Explaining how Search Engines work and leveraging them into finding hidden content.

OSINT

What information can you possible get with just one image file?

OSINT

Use a variety of OSINT techniques to solve this room created by the OSINT Dojo.

OSINT

OSINT challenges in the imagery intelligence category.

OSINT

An intro to SOCMINT (Social Media Intelligence/Investigation) techniques and tooling. Use your awesome OSINT skills to perform an online investigation of a mysterious husband!

Steganography

Steganography

Steganography

BadUSB

Learn how to craft and deploy BadUSB payloads for the Flipper Zero using DuckyScript. This room focuses on automating keystroke attacks for ethical hacking and testing purposes.

Writeups

S4vitar Machine's Resolutions.

Web Practice
Category
Description

Problems Solving

Codeforces is a project joining people interested in and taking part in programming contests.

Challenges

Platform to improve your coding skills through practical projects and build an outstanding portfolio.

Event
Description

The calendar of BSides events arround the world.

Podcasts
Language
Description

Spanish

Podcast recorded by Martin Vigo and Alexis Porros, they inform about all the news on the cybersecurity world.

English

The ISC StormCast is a daily short-form podcast that provides a summary of current network security-related events.

English

Published each weekday, the program also included interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

Community
Description

The community about this repository.

A community-driven project focused on developing security best practices and guidelines for configuring systems securely.

Documentaries
Genere
Year
Rating

Documentary

2005

8.7/10

Documentary - Biography

2014

8.1/10

Documentary

2012

7.4/10

Documentary

2015

7.1/10

Documentary

2013

5.7/10

Documentary

2013

7.4/10

Documentary

2013

6.8/10

Documentary

2001

7.6/10

Documentary

2007

7.2/10

Documentary

1984

7.7/10

Documentary - Short Film

2008

6.1/10

Documentary

2006

7.9/10

Documentary/Indie Film

2009

6.5/10

Documentary

2003

7.4/10

Documentary

2012

7.7/10

Documentary

2017

7.0/10

Documentary - Drama - TV Film

1999

7.3/10

Documentary

2010

7.2/10

Documentary - Indie Film

2001

7.3/10

Documentary

2017

7.4/10

Documentary

2014

8.2/10

Documentary - Short Film

2006

7.1/10

Documentary

2013

7.6/10

Documentary

2013

7.4/10

Documentary

2001

7.5/10

Documentary

2019

7.0/10

Documentary

2014

6.6/10

Documentary

2014

8.1/10

Documentary

1990

8.3/10

Documentary

2001

7.6/10

Drama - Science Fiction

2012

7.3/10

Documentary

2015

7.4/10

Documentary

2012

7.3/10

Title
Description

Explores modern red teaming methodologies and how they evolve to meet sophisticated threats.

Offers insights into planning, executing, and defending against cyberattacks.

Guides readers through techniques to breach highly secure networks.

A practical manual focusing on social engineering tactics and pretexting scenarios.

An essential resource for penetration testers, covering advanced tactics and strategies.

A step-by-step narrative illustrating hacking methods for breaching financial institutions.

A comprehensive guide introducing penetration testing techniques and tools, designed for beginners.

The official guide to mastering Kali Linux, including installation, configuration, and usage for security professionals.

A reference guide for defensive security operations, offering tools and techniques to protect networks.

Covers both offensive and defensive strategies for protecting infrastructure against cyber threats.

Official documentation for using Nmap for network discovery and vulnerability scanning.

Explores the psychological and technical aspects of social engineering and how to protect against it.

A guide to tools and techniques for maintaining anonymity online while communicating, publishing, or researching.

Title
Genere
Year
Rating

Drama - Science Fiction

2011

8.9/10

Drama - Crime - Mystery

2015

5.4/10

Documentary - Series

2016

7.3/10

Drama - Mystery - Sci-Fi

2020

7.9/10

Drama

2014

8.3/10

Thriller - Drama

2015

8.7/10

Action - Crime - Drama

2011

8.5/10

Action - Drama

2014

7.2/10

Cyberpunk - Animation

1998

8.2/10

Comedy

2014

8.5/10

Thriller - Crime

2016

8.1/10

Drama

2014

7.6/10

Comedy

2006

8.6/10

Science Fiction

2016

8.0/10

Documentary - Drama

2019

6.5/10

Drama - Mystery

2016

9.0/10

Thriller - Drama

2017

6.1/10

Title
Description

Tools and resources for web application security.

Adversarial tactics and techniques.

Incident response tools.

Awesome list of tools OSINT.

Awesome for some tools OSINT

Repository of playbooks.

The Largest Hub of Cybersecurity Tools

Awesome list of hacking.

A curated list of CVE PoCs.

A curated list of awesome YARA rules, tools, and resources.

OSINT Tools for the Dark Web

Awesome list of bug bounty

Awesome Red Team

Roadmap for hacker

Roadmap
Description

Learn to become a Cyber Security Expert.

Step by step guide to learn Linux in 2024.

Community driven roadmaps, articles and guides for developers to grow in their career.

Roadmap for hacker

Projects
Description

30 Cyber Projects on 2025 (With Source Code.

List of ideas for your cyber projects.

Github Links

[OWASP2(]https://github.com/kdairatchi/OWASP-Testing-Guide/tree/main/OWASP-Checklist)


🛠 Tech Stack

🛠 My Stats

🛠️ Tools

1. Utility

2. Miscellaneous

3. OSINT

3.1 Username Search

3.2 Email Search

3.3 GEOINT

4. News

5. Search Engines

Comprehensive dark web .onion search engine with multiple Tor links available: and .

6. DNS/IP

7. Post Explotation

8. Deobfuscators

9. Decompilers

10. Disassembler and debuggers

11. Web

12. Network

13. Cryptography

14. Forensic

15. Hex editors

16. Execution logging and tracing

17. System

18. Social Networks

18.1 Instagram

18.2 Linkedin

18.3 TikTok

18.4 OnlyFans

18.5 Discord

18.6 Twitch

18.7 Tinder

19. Steganographic

20. Steganalysis

21. Cryptocurrency

22. Delete Your Trace

23. Playbooks

24. Malware Analysis

25. SIEM

26. Password Managers

27. VPNs

28. RFID

29. Bug Bounty

📖 Learning

🗂 Resources

📚 Courses

📝 Certifications

🎥 Tutorials

🚩 CTFs - Training

🕸️ Practice Webs

🎤 Events

🎙️ Podcasts

👤 Community

Our community was born out of the shared passion of three students: , , and Luu. United by our interest in the fascinating world of cybersecurity, we decided to create a space where we can learn, share knowledge, and grow together in this dynamic and crucial field.

📺 Documentaries

📖 Books & Papers/Articles

-

🖥️ TV Shows

📙 Open-Source Repositories

🛣️ Learning Path

🖌️ Projects Based

💬 Collaborate

If you have some tool, resource or course that you want to share, or create an pull request.

🪪 Credits

Top Languages Card

contact me
awesome-osint
achirou
awesome-hacking
awesome-osint-for-everything
dark-web-osint-tools
awesome-bug-bounty
awesome-red-team
the-hacker-roadmap
ReadMe Templates
ReadMe Genrator
DevTools 1
The OWASP Top 10 - HHS.gov
Api Sec Top 10
owasp
url tools
Blog1
git1
git2
git2
git3
git4
Targets
Oneliners
GDorks
OWASP1
gotr00t0day
bigb0x
TakSec
dreadnode
linux
mac
ipsearch 1
web check
scam look up
censy
subdomain finder
xss reports
Hashcat Pass Recovery
BrowserLeaks
Hudson Rock
CavalierGPT - The First Comprehensive Infostealers AI Bot
Gravwell Community Edition
VigilantOnion
OnionIngestor
osint.rocks
Pim Eyes
IntelTechniques
Cybdetective
Face Comparison
OSINT Framework
FaceCheckID
Social Catfish
Google Lens
LensoAI
GetAllURLs (gau)
Guardey
NightShade
Smali/Baksmali mode for Emacs
Ctf-writeups
Secrets of a High Performance Security-Focused Agile Team
Dalvik Opcodes
AWS Config
DeepDarkCTI
WhatsMyName
NameCheck
UserSearch
BlackBird
CheckUser
Cupidcr4wl
Digital Footprint Check
IDCrawl
Maigret
Name Chk
Name Checkr
Name Checkup
NameKetchup
NexFil
Seekr
SherlockEye
Snoop
Industries OSINT
Epieos
ScanIdentity
LeakPeak
BreachDirectory
0t.rocks
MailTester
MXToolbox
DeHashed
Email Address Validator
Email Format
Email Permutator
EmailHippo
Ghunt
Gitrecon
h8mail
Have I Been Pwned
Holehe
Hunter
LeakCheck
LeakRadar
Telegram Group
Bellingcat
OhShint
GeoSpy
Picarta
IPLogger
GeoNames
Geoseer.net
GeoINT Search
Earth Engine Dataset
GeoPlatform Portal
FAO Map Catalog
Geocreepy
US Crisis Monitor
Toronto Live
GeoProtests API
GeoINT-py
OverPass Turbo
WolrdEinnwes
IT Security Guru
True People Search
Webmii
Usa-Oficial
Ussearch
ThatsThem
Shodan Search
Maltego
Spiderfoot
Google Advanced Search
Google Scholar
Bing
Yandex
MetaGer
DuckDuckGo
Startpage
Swisscows
Qwant
Ecosia
Mojeek
Brave Search
Yahoo Search
Baidu
Dogpile
Million Short
MetaCrawler (Zoo Search)
Carrot2
Ask
Search Engines Index
CachedViews
LibGen
2lingual
IntelligenceX
Censys
Binary Edge
PublicWWW
AlienVault
GrayHatWarfare
PolySwarm
Packet Storm Security
Shodan
ONYPHE
Netlas
Hunter
ZoomEye
Pulsedive
Vulners
CRT.sh
SecurityTrails
FullHunt
Grep App
GreyNoise
DNSDumpster
ExploitDB
SearchCode
LeakIX
DorkSearch
WiGLE
URL Scan
WayBackMachine
DeHashed
Fofa
Katana
OnionSearch
Darkdump
Ahmia Search Engine
Darkus
Onion Search Engine
Link 1
Link 2
TorBot
Darc
Prying Deep
DnsEnum
Amass
Columbus Project
findsubdomains
Merklemap
Subdomains Top 1 Million (5000)
Shubs Subdomains
DNS Jhaddix List
Domain Digger
DNSlytics
DNSTwist
SecurityTrails
InternetDB
GreyNoise Intelligence
FOFA
ZoomEye
Censys
ViewDNS.info
Internet Census 2012
ONYPHE
IPLeak
Robtex
Wappalyzer
Photon
Technology Lookup
BuiltWith
OSINT.SH
Nmap Checker Tool
Free Network Tools
Google Transparency Report
Certificate Search
CRT
LeakIX
URLScan.io
DNSDumpster
Domain Codex
SimilarWeb
IP Search
Reverse Domain
IANA - Root Zone Database
PunkSpider
Metabigor
URLDNA
Check-The-Sum
Adalanche
Empire
Silentrinity
PowerSploit
ebowla
JS Nice
de4dot
uncompyle6
Hopper
Karkatau
dnSpy
ILSpy
DotPeek
JADX
JAD
Luyten
R2Dec
Decai
IDA
Olly
plasma
radare2
iaito
x64dbg
ScratchABit
Ghidra
Cyberbro
recon-ng
SpySe
Git-Scanner
Keyscope
VHostScan
Shodan
SubFinder
sqlmap
URLVoid
NetworkMiner
Paros
pig
cirt-fuzzer
ASlookup
ZAP
mitmsocks4j
ssh-mitm
nmap
Nipe
Habu
Wifi Jammer
Firesheep
Scapy
Amass
sniffglue
Netz
RustScan
PETEP
TorCrawl
Midnight Sea
xortool
John the Ripper
Aircrack
Ciphey
Autopsy
sleuthkit
EnCase
malzilla
IPED - Indexador e Processador de Evidências Digitais
CyLR
CAINE
Volatility
Redline
REKALL
Log2Timeline (Plaso)
Cyber Triage
Dumpzilla
DFTimewolf
IPED Digital Forensic Tool
Volatility 3
Binalyze AIR
TestDisk
WinHex
Skadi
Hoarder
libregf
Radare2
Silk Guardian
evtkit
Pancake Viewer
Mobile Verification Toolkit (MVT)
Turbinia
Belkasoft Evidence Center
libevt
Sherloq
Kuiper
RegRipper4.0
HxD
WinHex
wxHexEditor
Synalize It
Hexinator
Wireshark
tcpdump
mitmproxy
Charles Proxy
usbmon
USBPcap
dynStruct
drltrace
Research on CMSTP.exe
Windows oneliners to download remote payload and execute arbitrary code
Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts
WSH Injection: A Case Study
Gscript Dropper
Metasploit
mimikatz
Hackers tools
OBEX_common.txt
OBEX_rare.txt
Everything
Aware Online: Instagram Search Tool
Combin
Comment Picker
Display Purposes
DownAlbum
Engagement-calculator
Export Comments
Hashtagify
Hashtags for Likes
HypeAuditor
Iconosquare
IGSuperStar
Imgbunk
ImgInn
In Tags
INSSIST
InstaFollowers
Instagram Crawler
Instagram Explorer
Instagram OSINT
Instagram Scraper
Instagram Search Tool (Aware Online)
InstaLoader
instaloctrack
InstaLooter
Keyhole
Leetags
MetaHashtags
Minter.io
noninstagram
Osi.ig
Osintgram
Otzberg.net
Panoramiq
Phantom Buster
Picodash
Scylla
Skimagram
Social-alerts
SocialInsider
socid_extractor
SoIG
tailwind
ThumbTube
trendHERO
Webstagram
Flufi
Find Instagram User ID
IntelligenceX: Linkedin
BridgeKeeper
CrossLinked
Email Reverse Lookup
Free People Search Tools
FTL
osint.support
InSpy
Linkedin Bookmarklet
Linkedin Profile Scraper
Linkedin Search TGC
LinkedInt
Osint Support Linkedin
Phantom Buster
raven
Recruitin.net
Recruitment Geek
ScrapedIn
Exolyt.com
Hashtags for Likes
HypeAuditor
Influence Grid
InstaFollowers
Mavekite.com
OSINT Combine TikTok Quick Search
Savefrom.net
Sinwindie TikTok Bookmarklet Tools
Snaptik.app
Tikbuddy
TikTok API
TikTok Creative Center Statistics
TikTok Downloader
TikTok Hashtags
TikTok Scraper
TikTok Timestamp
TikView
tikvstock
Tokvid
TubeHi
Vidnice
fansmetrics.com
Onlysearch.com
onlyfinder.com
hubite.com/onlyfans-search/
SimilarFans
FanSearch
ASTRAAHOME
Discord History Tracker
DISBOARD
Discord Bots (Community)
Discord ID Lookup
Discord Bots (Exploration)
DiscordServers
Discord Me
DiscordOSINT
Discord Bots
Twitch Tools
Twitch Tracker
Sully Gnome
Twitch Stream Filter
Untwitch.com
Twitch Overlap
Justlog
Twitch Recover
Twitch Database
Twitch Insights
Twitch Followage Tool
Badoo
Bumble
Coffee Meets Bagel
eHarmony
Grindr
happn
HER
Heybaby
Hinge
The Inner Circle
The League
Match.com
MeetMe
OkCupid
Plenty of Fish
Scruff
Tastebuds
Tinder
zoosk
110 steganographic tools
Cloakify
Stego_Dropper
silenteye
deep-steg
StegX
js-steg
steg
StegoProxy
Video-Steganography-for-Piracy-Prevention
openstego
steg
Stegbook
PDF_steganography
steganography_talk
ascii-steganography
voices
stego-retweet
ARMS
stegosaurus
Outguess
BitStegNet
stego-wave
StegoMP3
jSteganographiX
LSB-Steganography
jsteg
stego-toolkit
f5-steganography
Matroschka
Deep-Steganography
AudioStego
audio-steganography-algorithms
jphs
StegDroid
SteCoSteg
PNG-Mask
chess-steg
strogonoff
Pictograph
stegoVeritas
secretbook
snow10
mp3stego
stego_video
diit
stegosploit
stegolab
stego-book-2014
timeshifter
covertele
CCEAP
cloud-covert-channels
DNSExfiltrator
StegPage
CameraShy
stegUnicode
stelin
Hydan
deogol
Hugo source code
WOW
stegify
Steganography 101
Invoke-PSImage
instegogram
VSL
HackTricks - Stego Tricks
zsteg
StegOnline
Stegsolve
StegCracker
StegSeek
JJTC Steganalysis
Guillermito's Steganography
Stegdetect
Spy Hunter
Stegkit
Stegalyzer
Stego Suite
Stegsecret
StegExpose
Cryptonibbles - Mr. Robot Steganography
Forensics Analysis of Video Steganography Tools
Aletheia
Danielle Lerch's Papers
Steganalysis with CNN for Same Key Images
DeepSteg
tf_audio_steganalysis
SteganalysisCNN
ALASKA
IStego100K
StegOnline
Steganabara
Stegasawus
UDSS
BreakingSteganalysisGAN
Steganalyse
StegCracker
Welloganography Solver
McAfee Free Tools - Steganography
Mistica
Cookie Stego
AperiSolve
Steganalysis
YeNet-Pytorch
Steganalysis with CNN - Yedroudj-Net
Pytorch implementation of SRNet
LSB Toolkit
CAECNNcode
Stegolab
DL Steganalysis
Audio Steganalysis
Audio Steganalysis CNN
DeepSteg
Stegasaurus2
CryptoID
CoinTracker
Coinwink
Flowscan
Bitcoin Explorer
Ethereum Block Explorer
Blockchain Explorer
Blockcypher
Bitcoin Forums Search Engine
Addresschecker.eu
Cryptocurrency Alerting
Redact
DeleteMe
incogni
JustDeleteMe
IRP-AccountCompromised
IRP-Critical
IRP-DataLoss
IRP-Malware
IRP-Phishing
IRP-Ransom
Hive-Templates
Yabin
Any Run
Bluepot
Elastic Security YARA Rules
YARA-Signator
MalShare
The DFIR Report
Mobile Audit
Mastiff
Malheur
PyaraScanner
Static File Analyzer (SFA)
Yara Decompressor
Shotgunyara
VxSig
Hybrid-Analysis
Findom-XSS
Dalfox
PyLibEmu
Yara Station
NodeYara
Malware Traffic Analysis
Yara-Rust
Yara Rule Generator
StringSifter
Inlyse
yarGen
Cuckoo Sandbox
Vaya-Ciego-Nen
BruteXSS
Findsploit
xssor2
CFR
ReFlutter
Dwarf Debugger
Triton
Klara
Android Malware Sandbox
Fabric Platform
Wiz
XSSCon
GitHunter
jwt-key-id-injector
qsfuzz
Weaponised-XSS-payloads
XSSor
ReClass
Malwover
Odin
Distribute
YaraStation
CAPE
Cybersec
Keepass
Mullvad VPN
Proton VPN
IVPN
Proxmark3
ChameleonMini
Flipper Zero
ACR122U
LibNFC
MIFARE Classic Tool (MCT)
Cardpeek
Metrodroid
Metroflip
Seader
NFC Magic
MFOC
123Contact Form
99designs
Abacus
Acquia
ActiveCampaign
ActiveProspect
Adobe
AeroFS
Airbitz
Airbnb
Algolia
Altervista
Altroconsumo
Amara
Amazon Web Services
Amazon.com
ANCILE Solutions Inc.
Anghami
ANXBTC
Apache httpd
Appcelerator
Apple
Apptentive
Aptible
Ardour
Arkane
ARM mbed
Asana
YesWeHack
intigriti
HackerOne
Bugcrowd
Cobalt
Bountysource
Bounty Factory
Coder Bounty
FreedomSponsors
FOSS Factory
Synack
HackenProof
Detectify
Bugbountyjp
Safehats
BugbountyHQ
Hackerhive
Hacktrophy
AntiHACK
CESPPA
Wiki - AddieLamarr
PowerShell - Notes
PowerShell Guide
DuckyScript™ Quick Reference
BadUSB File Format
Osint-Dojo
OSTIN Attack Surface Diagrams
AN1305 MIFARE Classic as NFC Type MIFARE Classic Tag
Security related Operating Systems @ Rawsec
Best Linux Penetration Testing Distributions @ CyberPunk
Security @ Distrowatch
Pentest Cheat Sheets
Anna's Achive
PDFdrive
PowerShell Scripts
How to Become a Successful Bug Bounty Hunter
Researcher Resources - How to become a Bug Bounty Hunter
Bug Bounties 101
The life of a bug bounty hunter
Awsome list of bugbounty cheatsheets
Getting Started - Bug Bounty Hunter Methodology
cs50 - Harvard
overthewire.org
HTB-Academy
HackTheBox
Coursera
TryHackMe
EC-Council - Learning
Security Blue Team
Cybrary
Udemy
Professor Messer
Roppers Practical Networking
VirusTotal
Root the Box
edX
Hybrid Analysis
AbuseIPDB
HackerOne
Bugcrowd
Open Bug Bounty
RangeForce
Free Education Web
elHacker
Seguridad/si
Udemy
Tradecraft - a course on red team operations
Advanced Threat Tactics Course & Notes
FireEye - a whiteboard session on red team operations
Cisco CCNA
CompTIA Security+
CC
OSCP
OSWP
OSEP
eJPT
CREST Certified Simulated Attack Specialist
CREST Certified Simulated Attack Manager
SEC564: Red Team Operations and Threat Emulation
ELearn Security Penetration Testing eXtreme
Certified Red Team Professional
Certified Red Teaming Expert
PentesterAcademy Certified Enterprise Security Specialist (PACES)
Corelan Team's Exploit writing tutorial
Exploit Writing Tutorials for Pentesters
Understanding the basics of Linux Binary Exploitation
Shells
Missing Semester
Begin RE: A Reverse Engineering Tutorial Workshop
Malware Analysis Tutorials: a Reverse Engineering Approach
Malware Unicorn Reverse Engineering Tutorial
Lena151: Reversing With Lena
Blue Team Introduction
Kase Scenarios
TraceLabs
Geolocating Images (THM)
Google Dorking (THM)
OhSINT
Sakura Room
Searchlight-IMINT
KafeeSec-SoMeMINT
Stego-toolkit
Top CTF challenges
awesome-ctf
Flipper Zero BadUSB Mastery
InfoMachines
Codeforces
DevChallenges
BSides Calendar
Tierra de Hackers
ISC
Cyberwire Daily
RedProtect
bst04
Gabriel Grigor
cybersources
Harden the World
BBS: The Documentary
Citizenfour
Code 2600
Deep Web
DEFCON: The Documentary
DSKNECTD
Downloaded
Freedom Downtime
Good Copy Bad Copy
Hackers: Wizards of the Electronic Age
Hackers Are People Too
Hacking Democracy
Hackers Wanted
In the Realm of the Hackers
Indie Game: The Movie
Kim Dotcom: Caught in the Web
Pirates of Silicon Valley
Plug and Pray
Revolution OS
Silk Road: Drugs, Death and the Dark Web
Softwaring Hard
Steal This Film
TPB AFK: The Pirate Bay Away from Keyboard
Terms and Conditions May Apply
The Code
The Great Hack
The Hacker Wars
The Internet's Own Boy: The Story of Aaron Swartz
The KGB, the Computer and Me
The Secret History Of Hacking
The Singularity
War for the Web
We Are Legion: The Story of the Hacktivists
Next Generation Red Teaming
Targeted Cyber Attack
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Social Engineers' Playbook: Practical Pretexting
The Hacker Playbook 3: Practical Guide To Penetration Testing
How to Hack Like a PORNSTAR: A Step-by-Step Process for Breaking into a BANK
Penetration Testing: A Hands-On Introduction to Hacking
Kali Linux Revealed
PDF
Blue Team Field Manual (BTFM)
Cybersecurity - Attack and Defense Strategies
NMAP Network Scanning: Official Discovery
Social Engineering: The Art of Human Hacking
Incognito Toolkit: Tools, Apps, and Creative Methods for Remaining Anonymous
Black Mirror
CSI: Cyber
Dark Net
Devs
Halt and Catch Fire
Mr. Robot
Person of Interest
Scorpion
Serial Experiments Lain
Silicon Valley
StartUp
The Code
The IT Crowd
Travelers
Valley of the Boom
Westworld
You Are Wanted
OWASP
Mitre ATT&CK
TheHive Project
Awesome OSINT
awesome-osint-for-everything
Playbooks
CyberSecTools
awesome-hacking
awsome-CVE PoCs
awesome-YARA
dark-web-osint-tools
awesome-bug-bounty
awesome-red-team
the-hacker-roadmap
Cybersecurity
Linux
Ethical Hacking
the-hacker-roadmap
Fynd Academy
CyberAcademy - Project Ideas
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
↑
Tools
Utility
Miscellaneous
OSINT
Username Search
Email Search
GEOINT
News
Search Engines
DNS/IP
Post Explotation
Deobfuscators
Decompilers
Disassembler and debuggers
Web
Network
Cryptography
Forensic
Hex editors
Execution logging and tracing
System
Social Networks
Instagram
Linkedin
TikTok
OnlyFans
Discord
Twitch
Tinder
Steganographic
Steganalysis
Cryptocurrency
Delete Your Trace
Playbooks
Malware Analysis
SIEM
Password Managers
VPNs
RFID
Bug Bounty
Learning
Resources
Courses
Certifications
Tutorials
CTFs - Training
Practice Webs
Events
Podcasts
Community
Documentaries
Books & Papers/Articles
TV Shows
Open-Source Repositories
Learning Path
Projects Based
Collaborate
Credits