This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, intelligence gathering, physical intrusion, phishing, mobile apps, iot, social engineering, etc.
☆15Oct 22, 2020Updated 5 years ago
Alternatives and similar repositories for The-Hacker-Recipes
Users that are interested in The-Hacker-Recipes are comparing it to the libraries listed below
Sorting:
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 3 years ago
- Moorebot Scout programs☆10Mar 9, 2022Updated 3 years ago
- A post-exploitation tool to decrypt SolarPutty's sessions files☆37Dec 8, 2022Updated 3 years ago
- Amazon Echo skill to trigger the native Apple Find My iPhone "play sound" feature. Written in Python 3.6 and deploys easily on AWS Lambda…☆13Aug 3, 2021Updated 4 years ago
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆11Oct 17, 2020Updated 5 years ago
- For building TWRP for Samsung Note 5 GSM ONLY☆10Sep 22, 2017Updated 8 years ago
- A tool to BruteForce ssh. An upgraded version of Hydra. Multiple bruteforce options☆11Jul 9, 2022Updated 3 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- This tool is used for installing various OS in termux app like kali, debian, ubuntu etc.☆12May 2, 2020Updated 5 years ago
- ☆12Feb 8, 2023Updated 3 years ago
- ☆11Sep 1, 2019Updated 6 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Creates an rouge AP and phishes credentials☆10Dec 29, 2019Updated 6 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- DroidScript Documentation☆11Mar 26, 2024Updated last year
- Open source Spotify client☆12Sep 26, 2018Updated 7 years ago
- Curated list of Telegram-related projects☆11Apr 15, 2022Updated 3 years ago
- Web server and API to scan any websites to detect malicious JS☆19Jul 26, 2022Updated 3 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- Scrape Twitter for long hashtags that could be used as passwords☆10Jan 4, 2017Updated 9 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆11Dec 30, 2020Updated 5 years ago
- A tool to generate fake profile for filling of form☆11Apr 30, 2023Updated 2 years ago
- Use the Anki Cozmo robot with a GUI. Uses Python with TkInter.☆11Nov 28, 2018Updated 7 years ago
- ☆11Sep 3, 2023Updated 2 years ago
- Throttle those pesky radios and sensors without root!☆13Jul 30, 2022Updated 3 years ago
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆12Apr 22, 2018Updated 7 years ago
- This is a repository for reporting any issues in any of my software☆13May 15, 2018Updated 7 years ago
- An architecture independent binary analysis tool for fingerprinting functions through NLP☆15Feb 20, 2026Updated last week
- An Android tool to configure system storage and cache parameters☆18Jul 30, 2022Updated 3 years ago
- Slides for the online training programme "R for Beginners"☆12Sep 13, 2022Updated 3 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- ☆17Oct 26, 2021Updated 4 years ago
- ☆11Jul 24, 2015Updated 10 years ago
- ☆12Dec 7, 2022Updated 3 years ago