Please refer to The Treasure Trove repo below and read the guidelines before accessing this database
☆85Jul 11, 2015Updated 10 years ago
Alternatives and similar repositories for Hacking
Users that are interested in Hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Curated list of public penetration testing reports released by several consulting firms☆12Aug 18, 2016Updated 9 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆14Mar 7, 2019Updated 7 years ago
- RDP POC☆19Jun 1, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Windows Privilege Escalation☆10Dec 27, 2014Updated 11 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Nov 3, 2014Updated 11 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆16Mar 31, 2017Updated 9 years ago
- Network hacking tools written in Python☆12Dec 23, 2018Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago
- Python Security/Hacking Kit☆47Nov 10, 2019Updated 6 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Aug 7, 2016Updated 9 years ago
- CTF writeups☆29Apr 8, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Python tool for expired domain discovery in crossdomain.xml files☆23Feb 21, 2017Updated 9 years ago
- ☆49Jun 1, 2017Updated 8 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting, Spyware,Malwares evade anti-virus detection, Rookit CYPTER, An…☆319Nov 30, 2018Updated 7 years ago
- ☆21Nov 3, 2018Updated 7 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Jul 18, 2017Updated 8 years ago
- ☆51Sep 23, 2017Updated 8 years ago
- https://gitlab.com/kalilinux/nethunter/build-scripts/kali-nethunter-project☆14Nov 30, 2020Updated 5 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- w3af packaging for Kali distribution☆26Nov 29, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Setup HiddenEye Inside Of Termux☆10Jun 9, 2019Updated 6 years ago
- Full Stack Web Development with Raspberry Pi 3, published by Packt☆12Jan 30, 2023Updated 3 years ago
- Writeups of CTF challenges☆31Sep 30, 2020Updated 5 years ago
- Source code from Hacking: The Art of Exploitation (Second Edition).☆458Jan 7, 2024Updated 2 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- modified version of https://automatedhome.party/2017/07/15/wifi-controlled-car-with-a-self-hosted-htmljs-joystick-using-a-wemos-d1-minies…☆12Nov 27, 2017Updated 8 years ago
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆12Oct 17, 2020Updated 5 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Sep 24, 2018Updated 7 years ago
- Python3 source code and hack code.☆16Dec 19, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆19Feb 14, 2020Updated 6 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- Exhaustive list of hacking tools☆326May 15, 2020Updated 6 years ago
- Employee logger with RFID and database using jserialcomm java library☆12Aug 21, 2017Updated 8 years ago
- hacking-tutorials☆364Apr 16, 2021Updated 5 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago