NetW0rK1le3r / awesome-hacking-listsLinks
☆86Updated 4 years ago
Alternatives and similar repositories for awesome-hacking-lists
Users that are interested in awesome-hacking-lists are comparing it to the libraries listed below
Sorting:
- Trends Website (URL) from Twitter hackers.☆101Updated this week
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆70Updated 8 months ago
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆75Updated this week
- Collection of resources related to phishing☆156Updated 4 years ago
- Open source self-hosted cyber security learning platform☆53Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 2 weeks ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Updated 2 years ago
- Windows offline filesystem hacking tool for Linux☆96Updated 3 years ago
- Uses python3.10, Debian, python-Nmap, OpenaAI, and flask framework to create a Nmap API that can do scans with a good speed online and is…☆80Updated 8 months ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 4 years ago
- PowerShell Asynchronous TCP Reverse Shell☆160Updated last year
- RedTeam - Red Team Tools☆47Updated 2 years ago
- Windows And Ways To Break It☆99Updated last year
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Offensive security use cases of ChatGPT☆77Updated 2 years ago
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆98Updated 2 years ago
- Red Team Stuffs☆19Updated 3 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆288Updated 4 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆120Updated last year
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆16Updated 4 years ago
- ES ToolKit is a standalone solution to navigate and backup data for a wide range of Elasticsearch and Kibana versions.☆86Updated 2 years ago
- BackdoorSim: An Educational into Remote Administration Tools☆110Updated last year
- CVE-2024-52940 - A zero-day vulnerability in AnyDesk's "Allow Direct Connections" feature, discovered and registered by Ebrahim Shafiei (…☆35Updated 10 months ago
- Download utility for Tor☆53Updated 2 years ago
- Kali Packerge Manager☆65Updated last year
- ☆42Updated 3 weeks ago
- Lockbit, URSIF, BlackBasta etc.☆134Updated 4 months ago
- D3Ext's Forward Shell☆120Updated last year
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆166Updated last year