The Wayback Machine - https://web.archive.org/web/20220717195142/https://github.com/topics/hackingcode
Here are
17 public repositories
matching this topic...
🎯 PHP / ASP - Shell Backdoor List 🎯
Java 8 Guides and Tutorials - A lot of awesome examples using Java 8 features like Stream, Lambda, Functional Interface, Date and Time API and much more
Updated
Oct 12, 2020
Java
SoulTaker is a Open-Source MultiTool written by myself, contains a lot of things such as a phone spoofer, ip lookup, dox tool etc.
CDI Guide And Tutorials - Many examples of how to use CDI and CDI 2.0 like Qualifiers, Interceptors, Decorators, Lazy Initialization an much more!
Updated
Oct 12, 2020
Java
Find host header injections and perform Host Header attacks with other kind of bugs like web cache poissoning
Updated
Dec 8, 2021
Python
DC540 hacking challenge 0x00001.
Windows Auto Post Exploitation - For ReD Team
Updated
Jul 21, 2019
Python
Android Hacking Method 2022
Collect information about a domain and use it to plan a attack vector
Hacking Code - Mockito Guide and Tutorials
Docker Guides and Tutorials - Let's learn a lot about one of the most important and famous technology in the World!
JUnit 5 Guide and Tutorials - A lot of great examples of how to use the newest version of JUnit 5
Collection of notes of tools and commands I use during pen-testing.
command line utility for testing php local file inclusion
Updated
Jun 2, 2022
Python
Hacking Code - cURL Guides and Tutorials
Hacking Code - Spring Batch Guides and Tutorials
Hacking Code - Spring Data JPA Guides and Tutorials
Improve this page
Add a description, image, and links to the
hackingcode
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
hackingcode
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.