☆12Oct 31, 2022Updated 3 years ago
Alternatives and similar repositories for someawesome
Users that are interested in someawesome are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Nov 20, 2022Updated 3 years ago
- steal chrome saved passwords "undetectable"☆51Mar 15, 2022Updated 4 years ago
- Hacking with PasteJacking technique☆22Jul 2, 2024Updated last year
- ☆17Jul 26, 2018Updated 7 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 4 months ago
- User Recon Find usernames across over 75 social networks This is useful if you are running an investigation to determine the usage of the…☆15Feb 8, 2021Updated 5 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆22Jul 30, 2022Updated 3 years ago
- ☆10Feb 28, 2023Updated 3 years ago
- ☆26Oct 23, 2022Updated 3 years ago
- XSS payloads for bypassing WAF. This repository is updating continuously.☆10Aug 8, 2021Updated 4 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- A multi web security purposes tool☆47Mar 1, 2026Updated 3 weeks ago
- All in one tool for lazy hackers.☆10Apr 24, 2021Updated 4 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Kickstart your Ethical Hacking Journey with Fsociety by GDSC-SMIT Star the Repository and Open your First PR☆36Oct 25, 2023Updated 2 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Aug 2, 2021Updated 4 years ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆244Jul 3, 2024Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆116Jul 18, 2023Updated 2 years ago
- This repository include Docker Machines for practicing on some of the Web Attacks.☆14Nov 20, 2023Updated 2 years ago
- ☆19Apr 28, 2025Updated 10 months ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- a vulnerable GraphQL application☆20Dec 13, 2019Updated 6 years ago
- A minimal SOCKS5 proxy written in C.☆12Mar 8, 2021Updated 5 years ago
- Cent Nuclei Templates generated through the cent tool. Maintained by HackerWhite.☆11Aug 20, 2023Updated 2 years ago
- A Powerful Tool For Making Combo List(All possible modes)☆13Aug 30, 2021Updated 4 years ago
- A simple utility to generate domain names with all possible TLDs☆23Feb 3, 2023Updated 3 years ago
- Hello!! This is a Python script to Host a bot on Telegram to get Temporary mail and recieve it made by @WASCIV from @forever_knightss☆16Feb 13, 2026Updated last month
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- 自己零零散散研究以及收集的一些免杀技巧,以便为后续查阅,拓宽思路☆15Dec 11, 2019Updated 6 years ago
- ☆22May 13, 2019Updated 6 years ago
- A small program, lists all the stored user name and passwords with urls in Google Chrome.☆18Oct 21, 2021Updated 4 years ago
- List of Command&Control (C2) software☆50Nov 11, 2022Updated 3 years ago
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- ☆10Mar 29, 2021Updated 4 years ago
- ☆10Mar 15, 2017Updated 9 years ago
- ☆12Jul 8, 2020Updated 5 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated 2 years ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆23Jan 1, 2023Updated 3 years ago