4nkitd / h4ck3rLinks
A Browser Extension for chromium/firefox browser. Small tool for Developers & Pentesters.
☆27Updated last month
Alternatives and similar repositories for h4ck3r
Users that are interested in h4ck3r are comparing it to the libraries listed below
Sorting:
- Search for potential emails from your target in Github's public events☆16Updated 4 years ago
- A python network scanner using scapy☆23Updated 5 years ago
- hacker Tools cross-platform desktop App, support windows/MacOS/LInux ....☆41Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- Get trails tool: Get all urls indexed of target☆20Updated 4 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- An exploit for an XSS and RCE vulnerability in the GoAhead webserver for embedded devices.☆20Updated 4 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 4 years ago
- Packet sniffer using scapy☆23Updated 5 years ago
- proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, …☆33Updated 2 years ago
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 3 years ago
- pentester payload ,info hunte☆10Updated 3 years ago
- Sr. Penetration Tester. Creator of Sn1per. Top 20 worldwide on @BugCrowd in 2016. OSCE/OSCP/CISSP/Security+☆26Updated 6 months ago
- Python-Based Pentesting Framework☆30Updated 3 years ago
- Generic cracker example which is compatible with Hashtopolis☆22Updated 4 years ago
- Arkhota, a web brute forcer for Android.☆19Updated 2 years ago
- Windows offline filesystem hacking tool for Linux☆96Updated 3 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆16Updated 2 months ago
- The hacker technical cheat sheet☆43Updated 5 months ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆18Updated 4 months ago
- ☆61Updated 5 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Updated 6 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆19Updated 2 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆11Updated 4 years ago
- Payloads and Lists☆23Updated 5 years ago
- wordpress hash cracker .☆66Updated 4 years ago
- Fun wiz ya telly.... H4xxt00lZ☆28Updated last year
- 🔅 Reverse shell written on python3☆14Updated 5 years ago
- An organized collection of default passwords for various devices and services.☆40Updated 3 years ago
- ADB Download All Files - A dirty shell script to adb pull all readable files using adb pull & base64☆25Updated 4 years ago