Muhammd / Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
☆28Updated 5 years ago
Alternatives and similar repositories for Awesome-Hacking:
Users that are interested in Awesome-Hacking are comparing it to the libraries listed below
- A Report Generation Tool for Security Assessment☆63Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- python script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells☆33Updated 3 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- One line PS scripts that may come handy during your network assesment☆77Updated 4 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Updated 5 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆20Updated 3 years ago
- Reverse shell generator☆25Updated 5 years ago
- useful pentest note☆66Updated 5 months ago
- Personal blog about security, exploitation, CTFs, ...☆20Updated 5 years ago
- Network/WebApplication Information Gathering, Enumeration and Vulnerability Scanning (Under Development)☆17Updated 6 years ago
- ☆18Updated 5 years ago
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆34Updated 3 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆66Updated last year
- Tooling and commands for common red team and Infrastructure testing tasks☆41Updated 2 years ago
- Enumerate S3 buckets via certstream, domain, or keywords☆15Updated 6 years ago
- Do some quick reconnaissance on a domain-based web-application☆13Updated 3 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆23Updated 10 years ago
- My collection of nmap nse modules☆63Updated 5 years ago
- ☆27Updated 5 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- My notes, exercises, and reports on reverse engineering and penetrating applications☆16Updated 6 years ago
- ☆51Updated 11 years ago
- ☆59Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- ☆18Updated 7 years ago
- Virtual scenario for Network Penetration Testing☆14Updated 7 years ago