Print3M / Google-Hack-SearchLinks
Custom Google search engine dedicated to IT security & hacking stuff. Over 240 high-quality sources.
☆77Updated 3 weeks ago
Alternatives and similar repositories for Google-Hack-Search
Users that are interested in Google-Hack-Search are comparing it to the libraries listed below
Sorting:
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆68Updated last month
- 🔒 Modern C2 Platform with Cloudflare Tunnel Integration | WinRM & SSH Remote Management | Real-time Terminal & Remote Desktop | Built wi…☆124Updated last month
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆265Updated last month
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆208Updated 4 months ago
- ☆55Updated 2 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆276Updated 3 weeks ago
- Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bo…☆505Updated last week
- RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools☆47Updated last month
- Python alternative to Mimikatz lsadump::dcshadow☆157Updated 7 months ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆432Updated 3 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆44Updated 9 months ago
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆173Updated 5 months ago
- ☆163Updated 2 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 11 months ago
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆220Updated last month
- Decrypt Chromium based browser passwords with PowerShell.☆133Updated 2 months ago
- ☆186Updated 2 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆166Updated 6 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 4 months ago
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆183Updated 3 weeks ago
- ☆341Updated this week
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆58Updated 2 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Updated 10 months ago
- Group Policy Objects manipulation and exploitation framework☆288Updated last month
- The different ways to dump lsass☆236Updated 5 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆162Updated 3 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Updated 5 months ago
- Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and book…☆544Updated 3 weeks ago
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆206Updated 2 months ago