Print3M / Google-Hack-SearchLinks
Custom Google search engine dedicated to IT security & hacking stuff. Over 240 high-quality sources.
☆72Updated this week
Alternatives and similar repositories for Google-Hack-Search
Users that are interested in Google-Hack-Search are comparing it to the libraries listed below
Sorting:
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆67Updated 3 weeks ago
- CyberFind — a next-generation OSINT reconnaissance tool designed for cybersecurity professionals, penetration testers, and digital invest…☆49Updated 2 weeks ago
- RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools☆46Updated last month
- 🔒 Modern C2 Platform with Cloudflare Tunnel Integration | WinRM & SSH Remote Management | Real-time Terminal & Remote Desktop | Built wi…☆85Updated 3 weeks ago
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆259Updated last month
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆208Updated 4 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆44Updated 9 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆165Updated 5 months ago
- ☆336Updated this week
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆267Updated last week
- CF GeoBypasser Cyberpunk Framework is a Modular Offensive Toolkit designed to discover and bypass Cloudflare-based Geo-restrictions using…☆47Updated last month
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 5 months ago
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆252Updated 7 months ago
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆154Updated last week
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆129Updated 9 months ago
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆96Updated 4 months ago
- Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bo…☆336Updated 2 weeks ago
- Malware traffic obfuscation library☆38Updated 5 months ago
- This repository consists of extensions, that hacktron uses to execute specific workflows in CLI.☆76Updated 3 weeks ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 10 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Updated 5 months ago
- ☆55Updated 2 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆226Updated this week
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆429Updated 3 months ago
- Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and book…☆532Updated 2 weeks ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 10 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 4 months ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆427Updated 2 months ago
- Red Team tools containerized☆74Updated last month
- The different ways to dump lsass☆206Updated 5 months ago