3hm1ly / awesome-hacking-lists
hacking tools awesome lists
☆14Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-hacking-lists
- Web based favicon recon tool made using streamlit.☆9Updated 2 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 2 years ago
- Just a bunch of useful scripts for netsec/admin/others☆14Updated 4 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆19Updated 7 years ago
- Auto Web Vulnerability Scanning Framework☆11Updated 8 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Python support package to parse IP and host inputs from network based tooling☆11Updated last year
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- A port scanner written in PowerShell☆13Updated 3 years ago
- It is a script written in Python that performs brute force on workers' payroll files through the use of their DNI (National Identity Docu…☆11Updated 4 years ago
- Various scripts & tools☆11Updated 6 months ago
- Analyze an APK archive.☆19Updated 8 months ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆12Updated 2 years ago
- PHP tool to grab urls of a specific site.☆10Updated 5 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 4 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- A tool to check for response status codes with ease☆14Updated last year
- A list of universities with vulnerability disclosure policies☆11Updated 4 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆17Updated last year
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Subdomain crawler with wordlist using python☆12Updated 4 years ago
- Cryptocurrencies related Security resources☆14Updated last year
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆11Updated 3 years ago
- This repository contains all the XSS cheatsheet data to allow contributions from the community.☆10Updated 5 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 2 years ago
- Simple tools to handle string and generate subdomain permutations☆14Updated 2 years ago