A collection of hacks and one-off scripts
☆11Apr 6, 2020Updated 5 years ago
Alternatives and similar repositories for hacks
Users that are interested in hacks are comparing it to the libraries listed below
Sorting:
- Custom pentesting tools☆16Dec 11, 2019Updated 6 years ago
- Network Infrastructure Penetration Testing Tool☆15Oct 26, 2017Updated 8 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆13Nov 1, 2023Updated 2 years ago
- ☆11Jan 7, 2022Updated 4 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- iCloud-Bypass-MEID-Signal-Apple☆11Jul 16, 2024Updated last year
- ☆11Dec 10, 2023Updated 2 years ago
- .NET Binary Deserializer/Serializer - For all formats: [MC-NBFX], [MC-NBFS], [MC-NBFSE]☆20Feb 25, 2019Updated 7 years ago
- ☆13Mar 20, 2023Updated 3 years ago
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆17Dec 8, 2019Updated 6 years ago
- Simple Play/Pause controls for Spotify Web App☆16Oct 13, 2020Updated 5 years ago
- Clean all stupid ._dotfiles from FLIPPER SD after you mounted it on macOS.☆14Dec 3, 2023Updated 2 years ago
- ☆25Nov 20, 2023Updated 2 years ago
- 💸 1st place at Hack The Job 2022 - A chrome extension that automatically tracks purchases and budgets, alerting users if they go over t…☆15May 30, 2022Updated 3 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆90Mar 27, 2018Updated 7 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- computer software application to flash bootloader and read ECUs status☆13Jul 3, 2018Updated 7 years ago
- ☆23Dec 10, 2025Updated 3 months ago
- IntelGPT is a command line tool that allows you to examine specific input such as URLs, file hashes, domain names, and IP addresses using…☆17Jan 16, 2023Updated 3 years ago
- Metasploit Framework