Zero Trust Hackers . Cyber Security . Hacking Resources . Bug Bounty . Hacks
2.28K subscribers
109 photos
1 video
2 files
158 links
Zero Trust Hackers . Cyber Security . Hacking Resources . Bug Bounty . Hacks
Download Telegram
COURSE

๐Ÿ”ฐ THE CREATIVE HTML5 & CSS3 COURSE DEVELOPED BY ED ๐Ÿ”ฐ

Size: 1GB

๐Ÿ“ฅDownload Link:
https://mega.nz/folder/ABR2mBgY#EFMkvEXO-0nb4pRbaoTLDA

๐Ÿ”— Official Link:
https://developedbyed.com/p/the-creative-html5-css3-course

๐Ÿ“ขNo Copyright Infringement Intended, All The Credits & Rights Reserved to the Respected Actual Owner. We don't own this content.

Telegram Channel:
https://t.me/zerotrusthackers

WhatsApp Channel:
https://whatsapp.com/channel/0029VaxVv551iUxRku094918
GLBC in UK is Inviting Applications For: 2025 Global Leadership & Business Certification, Cambridge 

- Type: Training
- Location: Clare College, Cambridge
- Duration: 5 Days
- Eligible Countries : All
- Deadline: 18th April, 2025

Funding Type:

- Fully
- Partial and
- Self Funded

Benefits:

- Air ticket
- Accommodation
- Certificate
- Conference kits, etc

Grab the Fully Funded seat on time because the seat is limited!

Apply here:
https://kenyatrends.co.ke/glbc-in-uk-is-inviting-applications-for-2025-global-leadership-business-certification-cambridge
Scholarship

York University Graduate Scholarships for International Students (2025/2026)

York University, Canada is offering various scholarships for international students.

1. International Entrance Scholarships ($20k - $45k per year)
2. York Science Scholars Award ($10,000)
3. Ontario Graduate Scholarship ($15,000 per year)
4. International Student Emergency Bursary

How to Apply:
https://kenyatrends.co.ke/york-university-graduate-scholarships-for-international-students-2025-2026/

Share with Your Friends โค๏ธ
๐Ÿ‘1
๐”๐ฉ๐ฌ๐ค๐ข๐ฅ๐ฅ ๐ฒ๐จ๐ฎ๐ซ๐ฌ๐ž๐ฅ๐Ÿ ๐ฐ๐ข๐ญ๐ก ๐ญ๐ก๐ž๐ฌ๐ž ๐Ÿ‘ ๐ฆ๐ฎ๐ฌ๐ญ-๐๐จ ๐Ÿ๐ซ๐ž๐ž ๐ƒ๐š๐ญ๐š ๐€๐ง๐š๐ฅ๐ฒ๐ญ๐ข๐œ๐ฌ ๐œ๐จ๐ฎ๐ซ๐ฌ๐ž๐ฌ! ๐Ÿ“Š

1๏ธโƒฃ Data Analytics Essentials by Cisco - Learn the fundamentals.

2๏ธโƒฃ Google Data Analytics Professional - Access it for FREE using this ChatGPT prompt: 'Write a financial aid for me to apply on Courseraโ€™s Google Data Analytics Professional course considering that I am a student who does not earn yet.'

3๏ธโƒฃ Complete Power BI Course by Microsoft - Master data visualization!

๐‹๐ข๐ง๐ค๐Ÿ‘‡:-

https://tinyurl.com/m239d2s8

Enroll For FREE & Get Certified ๐ŸŽ“
COURSE

๐Ÿ”ฐ Master Course in CompTIA A+ (Core 1 & Core 2 - 101 Level) ๐Ÿ”ฐ

๐ŸŒŽSize: 298 MB

๐Ÿ“ฅDownload Link:
https://mega.nz/file/6G5niaDJ#HgQQa5eGqe9JWWH2rzzEbwTTr-EewOPziUR475WpOBs

๐Ÿ”— Or Buy on Udemy:
https://udemy.com/course/master-course-in-comptia-a-core-1-core-2-101-level/

๐Ÿ“ขNo Copyright Infringement Intended, All The Credits & Rights Reserved to the Respected Actual Owner. We don't own this content.

Telegram Channel:
https://t.me/zerotrusthackers

WhatsApp Channel:
https://whatsapp.com/channel/0029VaxVv551iUxRku094918
๐Ÿ”ฐ Learning the Skills ๐Ÿ”ฐ

Telegram Channel: https://t.me/zerotrusthackers

CS 642: Intro to Computer Security (http://pages.cs.wisc.edu/~ace/cs642-spring-2016.html)
academic content, full semester course, includes assigned readings, homework and github refs for exploit examples. NO VIDEO LECTURES.

CyberSec WTF (https://cybersecurity.wtf/)
CyberSec WTF Web Hacking Challenges from Bounty write-ups

Cybrary (https://www.cybrary.it/)
coursera style website, lots of user-contributed content, account required, content can be filtered by experience level

Free Cyber Security Training (https://www.samsclass.info/)
Academic content, 8 full courses with videos from a quirky instructor sam, links to research, defcon materials and other recommended training/learning

Hak5 (https://www.hak5.org/)
podcast-style videos covering various topics, has a forum, "metasploit-minute" video series could be useful

Hopper's Roppers Security Training (https://hoppersroppers.org/training.html)
Four free self-paced courses on Computing Fundamentals, Security, Capture the Flags, and a Practical Skills Bootcamp that help beginners build a strong base of foundational knowledge. Designed to prepare for students for whatever they need to learn next.

Learning Exploitation with Offensive Computer Security 2.0 (http://howto.hackallthethings.com/2016/07/learning-exploitation-with-offensive.html)
blog-style instruction, includes: slides, videos, homework, discussion. No login required.

Mind Maps (http://www.amanhardikar.com/mindmaps.html)
Information Security related Mind Maps

MIT OCW 6.858 Computer Systems Security (https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-security-fall-2014/)
academic content, well organized, full-semester course, includes assigned readings, lectures, videos, required lab files.

OffensiveComputerSecurity (https://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/lectures.html)
academic content, full semester course including 27 lecture videos with slides and assign readings

OWASP top 10 web security risks (https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project)
free courseware, requires account

SecurityTube (http://www.securitytube.net/)
tube-styled content, "megaprimer" videos covering various topics, no readable content on site.

Seed Labs (http://www.cis.syr.edu/~wedu/seed/labs.html)
academic content, well organized, featuring lab videos, tasks, needed code files, and recommended readings

TryHackMe (https://tryhackme.com/)
Designed prebuilt challenges which include virtual machines (VM) hosted in the cloud ready to be deployed

WhatsApp Channel:
https://whatsapp.com/channel/0029VaxVv551iUxRku094918
๐Ÿ‘1
โ‡๏ธ What is OTP token ?

A one-time password token (OTP token) is a security hardware device or software program that is capable of producing a single-use password or PIN passcode.

One-time password tokens are often used as a part of two-factor and multifactor authentication. The use of one-time password tokens hardens a traditional ID and password system by adding another, dynamic credential.

Depending upon the vendor, an OTP token will generate a PIN synchronously or asynchronously. Synchronous tokens use a secret key and time to create a one-time password. Asynchronous tokens use a challenge-response authentication mechanism (CRAM).

In the past, OTP security tokens were usually pocket-size fobs with a small screen that displayed a number. The number changed every 30 or 60 seconds, depending on how the token is configured and the user entered his or her user name and password, plus the number displayed on the token.

Today, OTP tokens are often software-based, and the passcode generated by the token is displayed on the user's smartphone screen. Software tokens make it easier for mobile users to enter authentication information and not have to keep track of a separate piece of hardware.

Share and Support

Telegram Channel:
https://t.me/zerotrusthackers

WhatsApp Channel:
https://whatsapp.com/channel/0029VaxVv551iUxRku094918
2025 Google Conference Scholarships

Perks:

* Roundtrip airfare
* Conference registration
* $100 stipend
* Hotel accommodation

Criteria:

* Be a full-time student enrolled with a recognized university in Africa OR Asia Pacific(APAC) who is in need of conference travel funds.
* If you're Non-African, also check the provided link for appropriate option.

Apply here:
https://kenyatrends.co.ke/2025-google-conference-scholarships/
๐Ÿ‘1
Interviewer: "What do you know about our company?"
Candidate: "I think you do something related to tech?"

Big mistake! A vague or uncertain response makes you look unprepared & disinterested. Employers want to see that youโ€™ve taken the time to understand their company & why youโ€™d be a great fit.

What NOT to say:
โŒ "I donโ€™t know much, but Iโ€™m eager to learn" (shows a lack of preparation)
โŒ "I just saw the job posting & applied" (feels random & unintentional)
โŒ "Itโ€™s a big company, so I thought itโ€™d be a good opportunity" (too generic & uninformed)

How to IMPRESS with your answer:
โœ”๏ธ Shows research & enthusiasm
"Your company is a leader in [industry/product/service] & I was excited to learn about your recent [mention an achievement, innovation or project]. I really admire your commitment to [company value or mission] & thatโ€™s one of the reasons Iโ€™m drawn to this opportunity"

โœ”๏ธ Demonstrates genuine interest
"From what Iโ€™ve read, your company stands out for [unique aspect: innovation, company culture, impact]. One thing that caught my attention was [specific initiative or milestone] & Iโ€™d love the opportunity to contribute to something similar"

โœ”๏ธ Aligns your goals with the companyโ€™s vision
"Iโ€™ve been following your companyโ€™s growth & I truly respect how you [mention key values, industry influence, sustainability efforts, etc.]. The way you [specific company approach] aligns with my own professional goals & Iโ€™m excited about the potential to be part of your team"

Take a few minutes to research before your interview, check their website, social media, recent news & LinkedIn updates. A well-prepared candidate always stands out!
โค1๐Ÿ‘1
๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐…๐‘๐„๐„ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐‚๐จ๐ฎ๐ซ๐ฌ๐ž๐ฌ๐Ÿ˜

- Artificial Intelligence (AI)
- Internet Of Things (IoT)
- Machine Learning (ML)
- Data Science

๐ŸŒŸ Globally Recognized Certification
๐ŸŒŸ 100% FREE โ€“ No Hidden Costs!
๐ŸŒŸ Boost Your Resume & Career

  ๐„๐ง๐ซ๐จ๐ฅ๐ฅ ๐Ÿ๐จ๐ซ ๐…๐‘๐„๐„ ๐Ÿ‘‡:-

https://bit.ly/3DBGkzk

๐ŸŽฏ Learn. Get Certified. Shine Bright!๐ŸŽ“โœจ
๐Ÿ’ Top Hackers Tools ๐Ÿ’ 

Github Teams โฌ…๏ธ

โ‡๏ธ Pish web tool
๐Ÿ”— Link : https://github.com/Cabdulahi/pish

โ‡๏ธ MITM attack tool
๐Ÿ”— Link : https://github.com/websploit/websploit

โ‡๏ธ Zero Trust Hack Tools
๐Ÿ”— Link : https://t.me/zerotrusthackers

โ‡๏ธ kill shot pentesting framework
๐Ÿ”— Link :https://github.com/bahaabdelwahed/killshot

โžก๏ธ Facebook Tool Links

โ‡๏ธ Facebook information gathering
๐Ÿ”— Link : git clone https://github.com/CiKu370/OSIF.git

โ‡๏ธ Facebook Toolkit + bots, dump private data
๐Ÿ”— Link : https://github.com/warifp/FacebookToolkit

โ‡๏ธ Facebook cracking tool Fcrack.py
๐Ÿ”— Link : https://github.com/INDOnimous/FB-Crack-

โ‡๏ธ Facebook and yahoo account cloner
๐Ÿ”— Link : https://gitlab.com/W1nz0N/fyc.git

โ‡๏ธ Facebook report tool
๐Ÿ”— Link : git clone https://github.com/IlayTamvan/Report

โ‡๏ธ Facebook BruteFoRce Tool
๐Ÿ”— Link : https://github.com/IAmBlackHacker/Facebook-BruteForce

โ‡๏ธ Zero Trust Hack Tools
๐Ÿ”— Link : https://t.me/zerotrusthackers

โ‡๏ธ Facebook hacking ASU
๐Ÿ”— Link : git clone https://github.com/LOoLzeC/ASU

โ‡๏ธ Facebook Downloader
๐Ÿ”— Link : https://github.com/barba99/facebook-spotify-youtube-descargar

โ‡๏ธ Hack Facebook MBF
๐Ÿ”— Link : git clone https://github.com/Rizky-ID/autombf

โ‡๏ธ Facebook Repot3
๐Ÿ”— Link : git clone https://github.com/PangeranAlvins/Repot3

โ‡๏ธ Facebook Information Gathering
๐Ÿ”— Link : https://github.com/xHak9x/fbi

โ‡๏ธ Facebook Brute with TOR
๐Ÿ”— Link : https://github.com/thelinuxchoice/facebash

โžก๏ธ Networking Tool Links

โ‡๏ธ ip camera ๐Ÿ“ท hacking
๐Ÿ”— Link : https://github.com/kancotdiq/ipcs

โ‡๏ธ Termux Lazyscript tool
๐Ÿ”— Link : https://github.com/TechnicalMujeeb/Termux-Lazyscript

โ‡๏ธ TMscanner Tool
๐Ÿ”— Link : https://github.com/TechnicalMujeeb/TM-scanner

โ‡๏ธ Trace location with IP
๐Ÿ”— Link : https://github.com/Rajkumrdusad/IP-Tracer

โ‡๏ธ WPS Wi-Fi hacking tool
๐Ÿ”— Link : https://github.com/nxxxu/AutoPixieWps

โ‡๏ธ Routersploit - vulnerability scanner and attacker
๐Ÿ”— Link : https://github.com/reverse-shell/routersploit.git

โ‡๏ธ Zero Trust Hack Tools
๐Ÿ”— Link : https://t.me/zerotrusthackers

โ‡๏ธ Local network exploiting tool Zarp
๐Ÿ”— Link : https://github.com/hatRiot/zar

โ‡๏ธ ip tracker, Device info by link
๐Ÿ”— Link : https://github.com/lucasfarre/ip-tracker

โ‡๏ธ Ip-Fy IP address information
๐Ÿ”— Link : https://github.com/T4P4N/IP-FY.git

โ‡๏ธ Wifite Wi-Fi hacking tool
๐Ÿ”— Link : https://github.com/derv82/wifite

โžก๏ธ Phishing Tool Links

โ‡๏ธ Modern phishing tool hidden eye
๐Ÿ”— Link :https://github.com/DarkSecDevelopers/HiddenEye

โ‡๏ธ complete phishing tool 32 templates + 1 customizable
๐Ÿ”— Link :https://github.com/thelinuxchoice/blackeye

โ‡๏ธ social media phishing with shellphish
๐Ÿ”— Link : https://github.com/thelinuxchoice/shellphish

โ‡๏ธ Advance Phishing OTP Bypass
๐Ÿ”— Link : https://github.com/Ignitetch/AdvPhishing

โ‡๏ธ Paytm Phishing OTP Bypass
๐Ÿ”— Link : https://github.com/Ignitetch/Paytm-Phishing

โ‡๏ธ Zero Trust Hack Tools
๐Ÿ”— Link : https://t.me/zerotrusthackers

โ‡๏ธ UberEats Phishing OTP Bypass
๐Ÿ”— Link : https://github.com/Ignitetch/UberEats-Phishing

โ‡๏ธ Whats App Phishing
๐Ÿ”— Link : https://github.com/Ignitetch/whatsapp-phishing

โ‡๏ธ Zomato Phishing
๐Ÿ”— Link : https://github.com/Ignitetch/Zomato-Phishing

โ‡๏ธ hotstar OTP Bypass
๐Ÿ”— Link : https://github.com/Ignitetch/Hotstar-otp-bypass

โ‡๏ธ Ola OTP Bypass
๐Ÿ”— Link ::-)https://github.com/Ignitetch/ola-otpbypass

โ‡๏ธ Amazon Payment Gateway Phishing
๐Ÿ”— Link : https://github.com/Ignitetch/Amazon-payment-gateway-phishing

Telegram Channel ๐Ÿ‘‡
https://t.me/zerotrusthackers

WhatsApp Channel๐Ÿ‘‡
https://whatsapp.com/channel/0029VaxVv551iUxRku094918
๐Ÿ‘1
โ‡๏ธ What is password salting ?

Password salting is a technique to protect passwords stored in databases by adding a string of 32 or more characters and then hashing them. Salting prevents hackers who breach an enterprise environment from reverse-engineering passwords and stealing them from the database.

Password salting increases password complexity, making them unique and secure without affecting user experience. It also helps prevent hash table attacks and slows down brute-force and dictionary attacks.

โ‡๏ธ Password hashing and why salting is required

Hashing prevents passwords from being exposed or stolen by threat actors, since they are not stored as plaintext. For example, when users create an account with a username and password on a website, their password is hashed and stored in an internal file system in an encrypted form.

When users log in, the password runs through a one-way hashing algorithm that converts the password into a different and unrecognizable string of characters. During login, this string is compared to the other hashes stored in the website's database. If the credentials match the stored hash, users can access the account. If it doesn't match, hash verification fails, and users are not able to log in.

Share and Support

Honeypot Explained: https://t.me/zerotrusthackers/16

OTP Tokens: https://t.me/zerotrusthackers/42

WhatsApp Channel๐Ÿ‘‡
https://whatsapp.com/channel/0029VaxVv551iUxRku094918
๐€๐ˆ & ๐Œ๐‹ ๐…๐‘๐„๐„ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐‚๐จ๐ฎ๐ซ๐ฌ๐ž๐ฌ ๐…๐ซ๐จ๐ฆ 6 ๐“๐จ๐ฉ ๐ˆ๐ง๐ฌ๐ญ๐ข๐ญ๐ฎ๐ญ๐ข๐จ๐ง๐ฌ!๐Ÿ˜

Explore these 6 amazing courses offered by the Government of India, Google, Harvard, MIT, and IBM.

Gain hands-on knowledge in Generative AI, Python, Machine Learning, and AIโ€™s impact on business strategyโ€”all at no cost.

Plus, youโ€™ll earn certificates to boost your resume!

๐‹๐ข๐ง๐ค ๐Ÿ‘‡:- 
 
https://bit.ly/4hCdn45
 
Enroll For FREE & Get Certified ๐ŸŽ“
๐†๐จ๐จ๐ ๐ฅ๐ž ๐…๐‘๐„๐„ ๐€๐ˆ/๐Œ๐‹ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐‚๐จ๐ฎ๐ซ๐ฌ๐ž

Unlock the world of AI/ML with Googleโ€™s completely free course series!

Learn everything from the basics of machine learning to advanced AI applications, guided by experts at Google.

๐‹๐ข๐ง๐ค๐Ÿ‘‡ :-

https://tinyurl.com/53bpvmkc

Enroll For FREE & Get Certified๐ŸŽ“
๐Ÿ‘1
โ—๏ธ Red Teaming Course โ—๏ธ
๐ŸŽฉActive Directory Pentesting With Kali Linux๐ŸŽฉ

๐Ÿ”– Description:
Active Directory Pretesting is designed to provide security professionals to understand, analyse and practice threats and attacks in a modern Active Directory environment. The course is beginner-friendly and comes with a walkthrough videos course and all documents with all the commands executed in the videos.

๐ŸŒŽ Size: 7.15GB
๐Ÿ“ FileType: 7z

๐Ÿ“ฅ Download Link:
https://mega.nz/folder/9E4zDSAK#qpO_t84aBYReOLaWhSPGww

๐Ÿ”— Or Buy on Udemy:
https://www.udemy.com/course/active-directory-pentesting-with-kali-linux-read-team-hacking/

๐Ÿ“ขNo Copyright Infringement Intended, All The Credits & Rights Reserved to the Respected Actual Owner. We don't own this content.

Telegram Channel:
https://t.me/zerotrusthackers

WhatsApp Channel:
https://whatsapp.com/channel/0029VaxVv551iUxRku094918

โ™ป๏ธShare And Support usโ™ป๏ธ
๐Ÿ‘1
๐Ÿ”ฐ Google Dork Method โœจ COMPLEX DORKS โœจ HQ Dork Guide ๐Ÿ”ฐ

What you learn today:

What is a Google Dork?
How to find keywords
How to write Google Dorks

What is a Google Dork?

The dorks you will learn how to make today are what programmers, web designers and pen-testers call Google Dorks, Sometimes people can also call these Complex or Deluxe dorks.

The reason why you would want Google Dorks is to abuse the Google search engine to find vulnerable websites, typically prone to SQLi Attacks.

Example of a Normal Dorks:

nulled.php?site=
nulled.php?num=buy
nulled.php?avd=paypal

Example of a Google Dorks:

Inurl: "" + ".to"
allinurl: "nulled" + "nodebt"
related: "cracking" + "nulled"

The reason Google Dorks are so much better is due to how site specific they can be, whereas if you generated a list you will most likely get lots of useless foreign websites.

How to find keywords?

Most average/newbie website pen-testers will use random keywords which come to there mind please don't do this.

Getting Started:

Find a website in the niche you want to crack
Look around the website for keywords these can be in the URL and maybe even in text!
Once you have 250 keywords save them in a notepad++ document
For this tutorial I will be finding gaming keywords.

Keywords I found:

steampowered
call of duty
grand theft auto
top 50 games
new games

note: don't use these keywords, It took me 30 seconds to find them they will be bad...

How to write a Google Dork:

What the start of google dorks mean:

intitle: which finds strings in the title of a page

allintext: which finds all terms in the title of a page

inurl: which finds strings in the URL of a page

site: which restricts a search to a particular site or domain

filetype: which finds specific types of files (doc, pdf, mp3 etc) based on file extension

link: which searches for all links to a site or URL

So now you know the basic dork examples you want to turn your keywords into dorks, make sure the actually make sense because if you have something like link:top 50 games it just wont work...

Examples of Dorks from my keywords:

allinurl: "steam" + "grand theft auto"
allinurl: "steam" + "call of duty"
Inurl: steampowered
inurl: "top 50 games"
inurl: "new games"
You can use the same keyword as many times as you think it will work, so your list of 250 keywords could become 500 quite easily!

Reverse Engineering Resources: https://t.me/zerotrusthackers/49

Top Hacker Tools: https://t.me/zerotrusthackers/47

Learn Ethical Hacking: https://t.me/zerotrusthackers/31

ENJOY LEARNING โค๏ธ

More Resources Here๐Ÿ‘‡
https://whatsapp.com/channel/0029VaxVv551iUxRku094918
โค1
๐Ÿ”ฐAwesome Repositories๐Ÿ”ฐ

Android Security (https://github.com/ashishb/android-security-awesome)
Collection of Android security related resources

AppSec (https://github.com/paragonie/awesome-appsec)
Resources for learning about application security

Asset Discovery (https://github.com/redhuntlabs/Awesome-Asset-Discovery)
List of resources which help during asset discovery phase of a security assessment engagement

Bug Bounty (https://github.com/djadmin/awesome-bug-bounty)
List of Bug Bounty Programs and write-ups from the Bug Bounty hunters

Capsulecorp Pentest (https://github.com/r3dy/capsulecorp-pentest)
Vagrant+Ansible virtual network penetration testing lab. Companion to "The Art of Network Penetration Testing" by Royce Davis

CTF (https://github.com/apsdehal/awesome-ctf)
List of CTF frameworks, libraries, resources and softwares

Zero Trust Hackers
https://t.me/zerotrusthackers

Cyber Skills (https://github.com/joe-shenouda/awesome-cyber-skills)
Curated list of hacking environments where you can train your cyber skills legally and safely

DevSecOps (https://github.com/devsecops/awesome-devsecops)
List of awesome DevSecOps tools with the help from community experiments and contributions

Embedded and IoT Security (https://github.com/fkie-cad/awesome-embedded-and-iot-security)
A curated list of awesome resources about embedded and IoT security

Exploit Development (https://github.com/FabioBaroni/awesome-exploit-development)
Resources for learning about Exploit Development

Fuzzing (https://github.com/secfigo/Awesome-Fuzzing)
List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis

Hacking (https://github.com/carpedm20/awesome-hacking)
List of awesome Hacking tutorials, tools and resources

Hacking Resources (https://github.com/vitalysim/Awesome-Hacking-Resources)
Collection of hacking / penetration testing resources to make you better!

Honeypots (https://github.com/paralax/awesome-honeypots)
List of honeypot resources

Incident Response (https://github.com/meirwah/awesome-incident-response)
List of tools for incident response

Industrial Control System Security (https://github.com/hslatman/awesome-industrial-control-system-security)
List of resources related to Industrial Control System (ICS) security

InfoSec (https://github.com/onlurking/awesome-infosec)
List of awesome infosec courses and training resources

IoT Hacks (https://github.com/nebgnahz/awesome-iot-hacks)
Collection of Hacks in IoT Space

Mainframe Hacking (https://github.com/samanL33T/Awesome-Mainframe-Hacking)
List of Awesome Mainframe Hacking/Pentesting Resources

Malware Analysis (https://github.com/rshipp/awesome-malware-analysis)
List of awesome malware analysis tools and resources

OSINT (https://github.com/jivoi/awesome-osint)
List of amazingly awesome Open Source Intelligence (OSINT) tools and resources

Cyber Security & Ethical Hacking Courses๐Ÿ‘‡
https://t.me/zerotrusthackers/41

Top Hackers Tools๐Ÿ‘‡
https://t.me/zerotrusthackers/47

More Resources Here
https://whatsapp.com/channel/0029VaxVv551iUxRku094918
โค1