Please refer to The Treasure Trove repo below and read the guidelines before accessing this database
☆83Jul 11, 2015Updated 10 years ago
Alternatives and similar repositories for Hacking
Users that are interested in Hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Curated list of public penetration testing reports released by several consulting firms☆12Aug 18, 2016Updated 9 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- Build locally, deploy to any cloud, Automate all configurations...☆17Mar 25, 2020Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- RDP POC☆19Jun 1, 2019Updated 6 years ago
- Windows Privilege Escalation☆10Dec 27, 2014Updated 11 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- This is a backdoor about discover network device ,and it can hidden reverse connecting the hacker's server with encrypt commuication 后门扫描…☆14Aug 29, 2015Updated 10 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Nov 3, 2014Updated 11 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆16Mar 31, 2017Updated 9 years ago
- mousejack hack☆13Mar 18, 2016Updated 10 years ago
- Network hacking tools written in Python☆12Dec 23, 2018Updated 7 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Aug 7, 2016Updated 9 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Feb 21, 2017Updated 9 years ago
- ☆50Jun 1, 2017Updated 8 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting, Spyware,Malwares evade anti-virus detection, Rookit CYPTER, An…☆315Nov 30, 2018Updated 7 years ago
- Windows HTTP协议栈远程代码执行漏洞 CVE-2021-31166☆19Nov 4, 2021Updated 4 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Jul 18, 2017Updated 8 years ago
- ☆51Sep 23, 2017Updated 8 years ago
- https://gitlab.com/kalilinux/nethunter/build-scripts/kali-nethunter-project☆13Nov 30, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Cards Against Megukas☆17Mar 20, 2026Updated 3 weeks ago
- w3af packaging for Kali distribution☆26Nov 29, 2015Updated 10 years ago
- Setup HiddenEye Inside Of Termux☆10Jun 9, 2019Updated 6 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Jun 22, 2019Updated 6 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- Microcorruption CTF☆12Jan 17, 2016Updated 10 years ago
- Public repository for some PowerShell projects I want to share with the world.