PowerShellLibrary / Hacker-Scripts
POWER(SHELL) ALL THE THINGS!
☆31Updated this week
Alternatives and similar repositories for Hacker-Scripts:
Users that are interested in Hacker-Scripts are comparing it to the libraries listed below
- Hacking Tools For All Debian-based OS☆46Updated 6 years ago
- Espia trafico de la red NETSPY.sh ( hackingyseguridad.com )☆21Updated this week
- A swiss army knife for pentesting networks☆19Updated last year
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated last year
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆21Updated 4 years ago
- Upgrade kali linux default installation☆14Updated 3 months ago
- SQLi Google Dork Scanner (new version)☆16Updated 3 years ago
- Hacking Tools Z0172CK☆31Updated last year
- ☆18Updated 6 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆18Updated 4 years ago
- Facebook bot dumper&scraper☆33Updated 3 months ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆53Updated last year
- ☆17Updated 7 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆35Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Information Gathering & WebSite ReConnaissance.☆21Updated 6 years ago
- O Hemera é um Software voltado para o desenvolvimento de Phishings. Seu intuito é auxiliar nos estudos de segurança digital.☆16Updated 3 years ago
- ☆33Updated 7 months ago
- Update of the Wifi Honey tool.☆9Updated 8 years ago
- 🔥Ready, Aim, Fire.🔥☆14Updated 2 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆18Updated 4 years ago
- A Simple Keylogger with the ability of FTP Transfer and Local Storage☆19Updated 5 months ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆17Updated 2 years ago
- Advance Google Dorker and Vulnerability Scanner☆49Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆50Updated 7 years ago