DedSecInside / Awesome-HackingLinks
A collection of various awesome lists for hackers, pentesters and security researchers
☆56Updated 7 years ago
Alternatives and similar repositories for Awesome-Hacking
Users that are interested in Awesome-Hacking are comparing it to the libraries listed below
Sorting:
- Key Logger with UI☆39Updated 9 years ago
- Advanced information gathering & OSINT framework for phone numbers☆70Updated last month
- Official Black Hat Arsenal Security Tools Repository☆66Updated 6 years ago
- This project is a continuation of the Moriarty project. But this osint website, has more feautres than Moriarty has☆33Updated 4 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆192Updated 2 years ago
- wifisky Python script for pentesting wireless networks☆99Updated 6 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆44Updated 6 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆137Updated 2 years ago
- Ransombile is a tool that can be used in different scenarios to compromise someone’s digital life when having physical access to a locked…☆83Updated 3 years ago
- WIP - Chromium plugin for PhoneInfoga's Google Search scanner☆83Updated 4 years ago
- Keylogger using pynput + mail sender☆55Updated 5 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆46Updated 3 years ago
- The `anonymous` script from ParrotSec OS and BackBox Linux, perfected to run on Kali Linux Rolling. Run the script with `sudo sh script.…☆129Updated 5 years ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆63Updated 3 years ago
- Information gathering tool - OSINT☆39Updated 6 years ago
- Python Script to help/automate the WiFi hacking exercises.☆88Updated 4 years ago
- A Windows Tool for doing OSINT investigations on a Facebook Profile☆75Updated 7 years ago
- A Complete Phishing Tool☆35Updated 5 years ago
- Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showe…☆43Updated 5 years ago
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆112Updated 3 years ago
- 1000 black hat tools Collected From github☆77Updated last year
- OSINT webcam mapping project☆87Updated 7 years ago
- Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,docx,pptx,xlsx) belongi…☆14Updated 10 years ago
- SMS Spoofer for Social Engineering/Pentest Engagements☆46Updated 8 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆57Updated 7 years ago
- Email-Enum searches mainstream websites and tells you if an email is registered!☆17Updated 6 years ago
- PhishX - The Complete Spear Phishing Tool☆108Updated 7 years ago
- Advance Google Dorker and Vulnerability Scanner☆49Updated 7 years ago
- 🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️☆124Updated last year
- Priv8 Image Capturing through Network Based On Driftnet☆24Updated 7 years ago