Enhance your hacking toolkit with my Chrome Extension. Designed for ethical hacking and red team activities, it offers tailored features for an improved browsing experience.
☆53Apr 5, 2025Updated last year
Alternatives and similar repositories for Extensions
Users that are interested in Extensions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delive…☆49Apr 5, 2025Updated last year
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆221Apr 5, 2025Updated last year
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆53Apr 5, 2025Updated last year
- Clickme is a powerful multi-step clickjacking tool designed for security professionals. Create, visualize, and demonstrate complex clickj…☆14Sep 4, 2025Updated 7 months ago
- Organize, track, and share vulnerability findings effortlessly. This Burp Suite extension integrates with Obsidian, offering a proven not…☆39Apr 5, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A detailed plan to achieve proficiency in hacking and penetration testing, with pathways including obtaining a degree in cybersecurity or…☆1,247Apr 5, 2025Updated last year
- Adding PowerShell scripts that I use on my Proxmox server to automate certain tasks.☆12Jan 9, 2026Updated 3 months ago
- Subbdom API Client☆13Feb 7, 2025Updated last year
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- ☆24Oct 17, 2024Updated last year
- Unauthenticated RCE on cups-browsed (exploit and nuclei template)☆18Oct 3, 2024Updated last year
- Cybersecurity Notes For Intermediate and Advanced Hackers | CEH Exam Prep Also Included☆70Feb 22, 2026Updated 2 months ago
- Performing website vulnerability scanning using OpenAI technologie☆67Apr 5, 2025Updated last year
- ☆14Oct 14, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- SSH brute-forcing tool written in python☆14Feb 10, 2023Updated 3 years ago
- Various scripts I create while doing CTFs. May or may not be helpful :)☆16Dec 14, 2024Updated last year
- LoadHound — Lightweight load testing tool for SQL databases.☆17Aug 8, 2025Updated 8 months ago
- ☆29Jul 7, 2023Updated 2 years ago
- An ongoing curated collection of awesome software, libraries, frameworks, talks & videos, best practices, learning tutorials and importan…☆21Jul 29, 2022Updated 3 years ago
- Get a number of your tweets from the Twitter API.☆13May 1, 2022Updated 3 years ago
- Free Cybersecurity tutorials for beginners with 351 interactive lessons. Easy-to-follow programming guides with hands-on practice exercis…☆32Oct 23, 2025Updated 6 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT i…☆12Sep 25, 2024Updated last year
- Tools Termux Phising By ArdiGans Official🏃☆15Jun 27, 2021Updated 4 years ago
- ☆14May 23, 2018Updated 7 years ago
- The powerfull Extract and Scanner Javascript urls (Upgrade Deeper search)☆21Nov 7, 2024Updated last year
- Knowledge that I have been acquiring in a completely self-taught way☆50Mar 9, 2026Updated last month
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- Client SDK for the Mobile Wallet Protocol☆22Jun 26, 2025Updated 10 months ago
- ☆16May 21, 2019Updated 6 years ago
- Email addresses harvester☆19May 3, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆16Aug 2, 2025Updated 8 months ago
- ☆85Nov 5, 2023Updated 2 years ago
- NAZAR is an information collection tool (OSINT) which aims to carry out Basic Information. It provides various modules that allow efficie…☆19May 25, 2023Updated 2 years ago
- ☆23May 18, 2024Updated last year
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- Obsidian Templates for OSCP, CPTS, and Training labs☆121Nov 19, 2025Updated 5 months ago
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆19Nov 13, 2024Updated last year