Pentesting Suite
☆70Jul 1, 2025Updated 10 months ago
Alternatives and similar repositories for Jammy
Users that are interested in Jammy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rubber Ducky powered by NeoKey☆30Jun 3, 2024Updated last year
- Quick commands for pentesting/No typing!☆19Nov 21, 2023Updated 2 years ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- Jok3r - Network and Web Pentest Framework☆17Apr 21, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Random OSINT idea tool thing☆27Jan 11, 2026Updated 3 months ago
- AirHack Project, a special wifi penetration tool for android☆18May 8, 2025Updated 11 months ago
- Passlord is a smart tool that creates lists of possible passwords using clever methods.☆32Aug 26, 2025Updated 8 months ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆14May 15, 2024Updated last year
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 7 months ago
- An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionals☆23Dec 16, 2021Updated 4 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- BlurSPY app is a very useful cell phone tracking application, which features a number of useful functions. If it is installed on the targ…☆11Dec 16, 2021Updated 4 years ago
- Android lock picker and more functionalities☆10Dec 30, 2021Updated 4 years ago
- APKinjector decompile an .apk and inject a backdoor with the meterpreter payload and recompiles the apk☆14Aug 25, 2019Updated 6 years ago
- Project Connected Home over IP is a new Working Group within the Zigbee Alliance. This Working Group plans to develop and promote the ado…☆12Mar 6, 2023Updated 3 years ago
- Want .uf2 files for your switch hacking needs? ask and link to the .bin payload you want, and I may get to it in my free time. I understa…☆18Feb 4, 2021Updated 5 years ago
- This is my personal wiki for hacking the router firmware used by (Sagemcom)F@ast Version 3.43.2 delivered from Sagemcom☆17Jun 1, 2019Updated 6 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Deletes old email from my Gmail accounts☆15Oct 13, 2017Updated 8 years ago
- A Phishing WIFI Rogue Captive Portal!☆44Feb 12, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A collection of awesome GitHub repositories for hackers, pentesters & security researchers. ADDING MORE REPOs SOON.☆61May 15, 2024Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- ☆30Jan 19, 2026Updated 3 months ago
- SnapOnAir Q10 Keyboard with ESP32☆10Oct 27, 2018Updated 7 years ago
- A library to modify another program's memory on linux x64.☆16Sep 10, 2025Updated 7 months ago
- This application is designed to help users recover lost or forgotten data such as Wi-Fi passwords, browser data, browser passwords, and o…☆41Mar 22, 2025Updated last year
- Flipper Zero Protocol Pirate - work in progress☆31Feb 8, 2026Updated 2 months ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated 3 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A tool designed to analyse email headers☆41Oct 4, 2022Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 6 years ago
- A Tor Pluggable Transport that shields Tor users from passive and active correlation attacks by employing WebRTC-based covert channels an…☆11Dec 9, 2025Updated 4 months ago
- Kernel-space x86_64 Linux rootkit leveraging kprobes and ftrace for syscall hooking (hiding entries and reverse shell backdoor)☆26Nov 20, 2025Updated 5 months ago
- SQL Detector Tool In Go Language☆22Jan 10, 2023Updated 3 years ago
- WiFi Penetration Testing & Auditing Tool☆776Apr 28, 2025Updated last year
- Raspberry Pi Wifi Jammer Project☆103Jul 27, 2016Updated 9 years ago