Matir / hacksLinks
Miscellaneous Hacks
☆17Updated last month
Alternatives and similar repositories for hacks
Users that are interested in hacks are comparing it to the libraries listed below
Sorting:
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆86Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆150Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated 2 years ago
- Airodump-ng WiFi Scan Visualizer☆61Updated 7 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆79Updated 3 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆75Updated last year
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- ☆53Updated 4 years ago
- Docker images for learning wifi hacking☆69Updated 7 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆118Updated 2 years ago
- This Script Will Detect Canary Token in Microsoft Word Documents☆56Updated 5 years ago
- Simple script to download some missing tools in Kali☆33Updated 5 years ago
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆41Updated 6 years ago
- A small collection of OSINT data collection tools.☆17Updated 6 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- WebHook for Red Team☆25Updated 4 years ago
- Search .git folders for emails and URL's that should otherwise be hidden☆33Updated 4 years ago
- hashcat benchmarks on AWS instances☆39Updated 3 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆11Updated 5 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- Mobile Pentesting Guide (WIP)☆25Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Updated 7 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- pen testing scripts☆12Updated 4 years ago