Hacking Notes
☆42Oct 27, 2025Updated 4 months ago
Alternatives and similar repositories for Hacking-Notes
Users that are interested in Hacking-Notes are comparing it to the libraries listed below
Sorting:
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- Linux Cyber Warfare Distro☆21Dec 16, 2025Updated 3 months ago
- Camera Hack bot - Powered by XPH4N70M☆24May 26, 2023Updated 2 years ago
- Find and collect parts of a Keepass master key to recover it in plain text from a memory dump☆20Feb 1, 2024Updated 2 years ago
- This tool is used to find the admin login page of a website.☆16Jan 15, 2021Updated 5 years ago
- Black-Tool-For-Windows☆15Sep 8, 2021Updated 4 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆22Sep 18, 2024Updated last year
- ☆14Nov 15, 2020Updated 5 years ago
- Simple script to generate shell / bash menu with key selectors.☆29Apr 1, 2025Updated 11 months ago
- "We always hack programs which you cannot competently protect..." © CipherHater☆20Jun 19, 2021Updated 4 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Aynı ağ içerisinde , ARP Spoofing saldırısı yapılmış hedef bilgisayarın ziyaret ettiği , HTTP protokolünü kullanan web sitelerine kod enj…☆18Jun 24, 2020Updated 5 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- This Is A Python Script That Forwards SMS Messages To A Discord Webhook☆10Feb 22, 2024Updated 2 years ago
- Telegram phishing is for testing purposes only and the security of users is responsible for any misuse☆10Feb 20, 2021Updated 5 years ago
- All credits to Matt Walker (Author of "CEH Certified Ethical Hacker All-in-One Exam Guide" ISBN 1264269943)☆11Feb 5, 2022Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 3 years ago
- Repository to put my notes related to OSCP certification☆26Aug 29, 2019Updated 6 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- Vulnerabilities exploitation examples, python☆23May 22, 2023Updated 2 years ago
- ☆11Nov 14, 2022Updated 3 years ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- Google Cyber Security Specialization - Activities☆16Dec 4, 2023Updated 2 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆40Feb 24, 2023Updated 3 years ago
- A simple service to handle processing of crypto payments.☆11Dec 11, 2022Updated 3 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14May 29, 2021Updated 4 years ago
- hacking tool menu!☆26Aug 4, 2021Updated 4 years ago
- Pointer is a Fast Simple Lightweight Tool for Endpoint Discovery.☆14Dec 30, 2023Updated 2 years ago
- Coursera☆18May 30, 2023Updated 2 years ago
- DCS World Mod Manager☆11May 21, 2025Updated 9 months ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- ☆28Mar 25, 2021Updated 4 years ago
- ☆24Mar 2, 2026Updated 2 weeks ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- EXTREME PROXY HARVESTER AND CHECKER By Jeff Childers Harvest and Check Free Proxies. Check For Alive and Anonymous Proxies. This Requir…☆16Dec 7, 2017Updated 8 years ago
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- This repository contains a framework of curated Azure penetration testing tools that are specifically designed to help you identify and m…☆22May 13, 2023Updated 2 years ago
- CyberSecurity Resources and Tools☆28Jun 24, 2024Updated last year