Ekultek / HacAptLinks
Package manager for hackers built by hackers
☆36Updated 6 years ago
Alternatives and similar repositories for HacApt
Users that are interested in HacApt are comparing it to the libraries listed below
Sorting:
- Massive arsenal of hacker tools...☆78Updated 7 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- 💻 GitClin V1.0 for downloading and installing tools☆15Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 8 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 4 years ago
- An automated Python script which installs an extra arsenal of penetration testing tools and utilities into Kali Linux.☆30Updated 8 years ago
- Tools and scripts dedicated to Android application security☆49Updated 4 years ago
- Autosploit = Automating Metasploit Modules.☆77Updated 6 years ago
- Automation Hacking & Penetration Testing Suite☆11Updated 9 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆34Updated 7 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆35Updated 8 years ago
- python remote access trojan☆37Updated 8 years ago
- wifi attacks suite☆59Updated 4 years ago
- Small backdoor using cookie.☆63Updated 8 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆82Updated 5 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 6 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆38Updated 6 years ago
- Shodan.io Command Line Interface☆44Updated 4 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Updated 12 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆37Updated 5 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆50Updated last year
- web information gathering / Grab links☆43Updated 5 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- Simple Karma Attack☆69Updated 4 years ago
- pen testing scripts☆12Updated 4 years ago
- Get clients and access points.☆49Updated 5 years ago
- Metasploit/MSFVenom Payload Generator Stand Alone☆32Updated 8 years ago
- Arduino Rubber Ducky Framework☆107Updated 6 years ago
- ☆19Updated 8 years ago
- SMS Phishing Tools☆79Updated 8 years ago