NetW0rK1le3r / awesome-hacking-listsLinks
☆86Updated 4 years ago
Alternatives and similar repositories for awesome-hacking-lists
Users that are interested in awesome-hacking-lists are comparing it to the libraries listed below
Sorting:
- Trends Website (URL) from Twitter hackers.☆99Updated this week
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 4 years ago
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆67Updated 7 months ago
- Open source self-hosted cyber security learning platform☆53Updated 2 years ago
- A GUI Frontend for services provided by https://thc.org/segfault☆77Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- PowerBruteLogon (Ported version of WinBruteLogon in pure PowerShell)☆123Updated last year
- A certificate transparency log keyword sniffer written in python☆82Updated 2 years ago
- CVE-2024-52940 - A zero-day vulnerability in AnyDesk's "Allow Direct Connections" feature, discovered and registered by Ebrahim Shafiei (…☆35Updated 9 months ago
- Kali Packerge Manager☆65Updated last year
- Google Dorking tool☆18Updated 9 months ago
- A Linux persistence tool!☆156Updated last year
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆67Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated this week
- Windows offline filesystem hacking tool for Linux☆97Updated 3 years ago
- PowerShell Asynchronous TCP Reverse Shell☆160Updated last year
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆98Updated last year
- DNSWatch - DNS Traffic Sniffer and Analyzer☆203Updated 6 months ago
- ☆52Updated 2 years ago
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆76Updated this week
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆16Updated 4 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆57Updated last year
- ES ToolKit is a standalone solution to navigate and backup data for a wide range of Elasticsearch and Kibana versions.☆85Updated last year
- Collection of resources related to phishing☆150Updated 4 years ago
- Lockbit, URSIF, BlackBasta etc.☆132Updated 3 months ago
- Golang tool to help in forcing a license for HAK5 C2 Tool☆52Updated last year
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- D3Ext's Forward Shell☆120Updated last year
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆96Updated 3 years ago
- ☆14Updated 6 years ago