ByteHackr / HackingTools-2
A collection of awesome lists for hackers, pentesters & security researchers.
☆304Updated last year
Alternatives and similar repositories for HackingTools-2:
Users that are interested in HackingTools-2 are comparing it to the libraries listed below
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting, Spyware,Malwares evade anti-virus detection, Rookit CYPTER, An…☆273Updated 6 years ago
- 🔺 Red Team Hardware Toolkit 🔺☆326Updated 5 years ago
- [Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For e…☆468Updated 5 years ago
- BEST HACKING TOOLS..For more tools visit our blog for Hackers☆121Updated last year
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆370Updated 2 years ago
- Metasploit custom modules, plugins, resource script and.. awesome metasploit collection☆393Updated 2 years ago
- Metasploit Cheat Sheet 💣☆430Updated 5 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆179Updated last year
- An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to he…☆228Updated 2 years ago
- Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a…☆434Updated 3 months ago
- Exploit Pack contains a full set of 39.000+ exploits, you can be sure that your next pentest will become unstoppable. All operating syste…☆89Updated 3 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆219Updated 9 months ago
- Kali Linux Offensive Security Certified Professional Survival Exam Guide☆298Updated 6 years ago
- A collection of useful links for Pentesters☆156Updated 3 years ago
- Automated brute-forcing attack tool.☆402Updated 4 years ago
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert En…☆503Updated 10 months ago
- ⚔️ A collection of awesome penetration testing resources, tools, and other shiny things.☆253Updated last year
- As hackers, we put a premium on function over elegance as time is always scarce. When you need to quickly create a solution to a problem,…☆255Updated last year
- Mobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting☆863Updated last week
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆399Updated last year
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆163Updated last year
- A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.☆271Updated 9 years ago
- My collection of various security tools created mostly in Python and Bash. For CTFs and Bug Bounty.☆881Updated 3 weeks ago
- Graphical Web interface developed to facilitate the use of security information tools.☆246Updated 3 years ago
- Find username in social networks. demo:☆34Updated 5 years ago
- Hardware/IOT Pentesting Wiki☆609Updated last week
- My documentation and tools for learn ethical hacking.☆138Updated 3 years ago
- Wireshark Cheat Sheet☆388Updated 4 years ago
- A curated list of awesome privilege escalation☆1,320Updated 10 months ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆863Updated last year