List of NSO Pegasus's C2C Servers where will be used to control Pegasus.
☆22Nov 2, 2025Updated 4 months ago
Alternatives and similar repositories for The-NSO-Blacklist
Users that are interested in The-NSO-Blacklist are comparing it to the libraries listed below
Sorting:
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 9 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆33Jul 31, 2025Updated 7 months ago
- hashgen - the blazingly fast hash generator☆40Mar 12, 2026Updated last week
- Google dorks generator to find open shells (on government sites)☆28Jul 9, 2014Updated 11 years ago
- ☆16May 6, 2015Updated 10 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Nov 27, 2025Updated 3 months ago
- Obiettivi e Istruzioni d'Uso del "Progetto Software Libero - Monitoraggio Civico Uso e Riuso"☆10Jun 6, 2020Updated 5 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Jun 30, 2020Updated 5 years ago
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- Tool for finding Known Vulnerability of an ip address☆13Nov 13, 2024Updated last year
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 3 months ago
- bugreport☆13May 19, 2019Updated 6 years ago
- Curated hosts with various domain blocks!☆27Nov 18, 2024Updated last year
- Scripts by cyclone to automate tasks☆24Dec 12, 2025Updated 3 months ago
- ☆14Mar 12, 2026Updated last week
- Bridge Delta Chat with any service supported by matterbridge☆28Jan 9, 2025Updated last year
- Scripts to build a trimmed-down Windows 10 image. Use windows 10 Official ISO☆25Feb 5, 2025Updated last year
- ☆12Aug 1, 2022Updated 3 years ago
- Comprehensive hosts to block Ads, Analytics, Tracking & Telemetry based on Exodus list☆11Oct 31, 2024Updated last year
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 3 months ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- USB rubber ducky 2.O, A simple programmes which stole victim sensitive data by USB in one click & bypass firewall & defender.☆11Apr 21, 2021Updated 4 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 5 months ago
- An echo bot in multiple languages to get you started☆23Nov 6, 2025Updated 4 months ago
- A collection of malware families and malware samples which use the Rust programming language.☆210Updated this week
- ☆15Apr 5, 2022Updated 3 years ago
- Fairly Undetectable Linux Spyware☆18Mar 1, 2023Updated 3 years ago
- Send Webpages to your Kindle directly by one command☆12Mar 17, 2018Updated 8 years ago
- YouTube client built with Vue, demonstrating SABR playback via YouTube.js & googlevideo☆53Nov 16, 2025Updated 4 months ago
- ☆16Dec 13, 2025Updated 3 months ago
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆108Dec 3, 2025Updated 3 months ago