AnLoMinus / HacKingView external linksLinks
HacKing Tools Downloader: Downloading HacKing Tools and exporting by categories to $HOME directory
☆88Jul 1, 2022Updated 3 years ago
Alternatives and similar repositories for HacKing
Users that are interested in HacKing are comparing it to the libraries listed below
Sorting:
- PenTest - Penetration Testing Tools Downloader☆26Aug 29, 2022Updated 3 years ago
- RedTeam - Red Team Tools☆48Oct 30, 2022Updated 3 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆91Dec 7, 2025Updated 2 months ago
- A powerful reverse shell generator☆46Apr 15, 2022Updated 3 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- TeleHack - Telegram Tools, Packs, Bots, Info, Administration, Scrapers, Adders, Groups & Channels, and more..☆17Apr 30, 2022Updated 3 years ago
- Insta hack is a bash based script which is officially made to test password strength of instagram account from termux with bruteforce att…☆15Apr 10, 2022Updated 3 years ago
- want to remove sensitive data from photos or even view it? use autoexif to easily help you do that no more remembering syntaxs with this …☆38Apr 23, 2025Updated 9 months ago
- Recon Automation☆11Sep 14, 2024Updated last year
- Diablo ~ Hacking / Pentesting & Reporting☆254Dec 8, 2025Updated 2 months ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- H-SPLOIT-PAYLOAD GENERATE METASPLOIT PAYLOAD IN 1 CLICK☆31Jan 18, 2022Updated 4 years ago
- Resources for AD penetration testing and security☆33Feb 21, 2022Updated 3 years ago
- Payload delivery via URL and some social engineering.☆17Jul 13, 2024Updated last year
- Scripts for pentesting/hacking☆18Jan 22, 2022Updated 4 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- Automatic reverse/bind shell generator cheat sheet.☆34Jan 9, 2023Updated 3 years ago
- Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools☆59Nov 30, 2022Updated 3 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Apr 19, 2022Updated 3 years ago
- An automated e-mail OSINT tool☆23Apr 23, 2022Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21May 15, 2022Updated 3 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- Bulk download porn videos☆15Nov 24, 2025Updated 2 months ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Sep 6, 2024Updated last year
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆24Nov 18, 2025Updated 2 months ago
- Discover the simplicity and efficiency of Void Linux on your Android device with VoidMagic! 🚀☆10Dec 11, 2023Updated 2 years ago
- Install your remote server for the Lamassu Cryptomat☆18Jan 7, 2026Updated last month
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- Offensive penetration testing. Perform multiple attack types against web applications, vulnerable programs and OSes in predefined and saf…☆27Aug 14, 2020Updated 5 years ago
- nsfw & porn detection for mobile in ncnn☆11Dec 24, 2021Updated 4 years ago
- Hasherdotid☆10Jul 10, 2018Updated 7 years ago
- https://mega.nz/folder/SZhAUa6J#oTtC5auXmgBAMaWl2_SQ-g☆13Mar 5, 2022Updated 3 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Dec 26, 2022Updated 3 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Apr 5, 2022Updated 3 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Jan 6, 2022Updated 4 years ago
- Hack Tricks and survival kit (For Bug Bounty Program Use)☆13Sep 10, 2022Updated 3 years ago