Mr-Cyb3rgh0st / Hacking-ResourcesView external linksLinks
Cyber-Security-Resources
☆12Jun 6, 2023Updated 2 years ago
Alternatives and similar repositories for Hacking-Resources
Users that are interested in Hacking-Resources are comparing it to the libraries listed below
Sorting:
- A collection of hacking / penetration testing resources to make you better!☆10Nov 11, 2020Updated 5 years ago
- It automates the installation and configuration of a workspace environment in the popular Kitty terminal, using the Catppuccin theme.☆18Jan 30, 2026Updated 2 weeks ago
- ALL IN ONE Hacking Tool For Hackers☆10Jun 2, 2022Updated 3 years ago
- ☆14Oct 31, 2022Updated 3 years ago
- MDM-ready scripts for detecting and monitoring OpenClaw (clawdbot, moltbot) on managed devices. Detect, audit and secure shadow AI agents…☆46Feb 8, 2026Updated last week
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- kernel module for modifying device information...☆22Sep 24, 2025Updated 4 months ago
- A marketplace integrated with the Bitcoin currency☆44Jan 5, 2013Updated 13 years ago
- RootShield : The Ultimate Shield for Rooted Android Devices - Protect your rooted Android device from unauthorized file operations and pr…☆20Dec 8, 2025Updated 2 months ago
- Exploiting CVE-2014-3153, AKA Towelroot.☆13Jan 16, 2021Updated 5 years ago
- Linux内核学习——心中的内核☆19Jun 24, 2025Updated 7 months ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆27Nov 10, 2025Updated 3 months ago
- Non-Custoridial Secure Trustfree Bitcoin Marketplace with Escrow using Multipart Keys☆17May 31, 2023Updated 2 years ago
- 支付宝调试壳工程☆13Mar 29, 2020Updated 5 years ago
- Ethical Hacking Roadmap 🌐🔒☆11Dec 19, 2023Updated 2 years ago
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- Obsidian Plugin GPG Inline Encrypt☆21Dec 3, 2025Updated 2 months ago
- Android Kernel Vulnerability (CVE-2019-2215) temporary root PoC☆13Dec 21, 2023Updated 2 years ago
- This repository contains a guide to completing the Bandit levels in the OverTheWire wargames.☆15May 7, 2019Updated 6 years ago
- Fuzzing All Native Android System Services with Interface Awareness and Coverage☆35Sep 8, 2025Updated 5 months ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 10 months ago
- ☆17Jun 10, 2025Updated 8 months ago
- ☆39Oct 18, 2025Updated 3 months ago
- Remote administration toolkit for windows, based on Hidden VNC: file manager, keystroke logger, powershell☆35Nov 23, 2025Updated 2 months ago
- Obtanium import file to setup an Android console without a Google account.☆17Apr 13, 2025Updated 10 months ago
- A logger for SSH login attempts. BLOCKS ALL LOGINS☆12Apr 4, 2020Updated 5 years ago
- Integer overflow in FreeType software, which also affects Chrome☆23Aug 27, 2025Updated 5 months ago
- A Rust CLI tool to convert images into ASCII art. Supports color, grayscale, block-based sampling, and customizable charsets.☆30Jan 6, 2026Updated last month
- Image Recognition using Python☆18Aug 11, 2024Updated last year
- The Project Ninja is A RTC2 and Trojan-Malware Cyber-Attack Simulation toolkit designed for red team attackers to rapidly and dynamically…☆15Jan 9, 2026Updated last month
- 安卓保活技术☆19Mar 12, 2024Updated last year
- Various examples of using eBPF code☆18Jan 3, 2024Updated 2 years ago
- Bitcoin, Monero, Zcash marketplace. Test site:☆13Feb 12, 2020Updated 6 years ago
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆13Jan 28, 2023Updated 3 years ago
- ☆14Jan 8, 2024Updated 2 years ago
- Using DLL sideloading to hijack the exe main thread before starting it! 使用dll侧载在exe程序主线程启动之前劫持主线程。☆26Jul 25, 2025Updated 6 months ago
- ☆25Updated this week
- iOS crash log symbolication tool for jailbroken devices☆18Jan 30, 2026Updated 2 weeks ago
- Unofficial Arch Linux repo for the GPD Pocket☆18Jan 5, 2018Updated 8 years ago