Print3M / Google-Hack-SearchLinks
Custom Google search engine dedicated to IT security & hacking stuff. Over 240 high-quality sources.
☆77Updated 3 weeks ago
Alternatives and similar repositories for Google-Hack-Search
Users that are interested in Google-Hack-Search are comparing it to the libraries listed below
Sorting:
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆69Updated last month
- 🔒 Modern C2 Platform with Cloudflare Tunnel Integration | WinRM & SSH Remote Management | Real-time Terminal & Remote Desktop | Built wi…☆124Updated last month
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆265Updated last month
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆276Updated 3 weeks ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆208Updated 4 months ago
- ☆55Updated 2 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆231Updated this week
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆44Updated 9 months ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆432Updated 3 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Updated 10 months ago
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆220Updated last month
- Group Policy Objects manipulation and exploitation framework☆288Updated 2 months ago
- RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools☆48Updated last month
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆166Updated 6 months ago
- Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bo…☆505Updated last week
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆173Updated 5 months ago
- ☆163Updated 2 months ago
- CyberFind — a next-generation OSINT reconnaissance tool designed for cybersecurity professionals, penetration testers, and digital invest…☆55Updated last week
- The different ways to dump lsass☆236Updated 5 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 11 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 4 months ago
- Decrypt Chromium based browser passwords with PowerShell.☆133Updated 2 months ago
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆254Updated 7 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 11 months ago
- Dominate the domain. Relay to royalty.☆165Updated last week
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆162Updated 3 months ago
- ☆341Updated this week
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆264Updated 9 months ago
- ☆186Updated 2 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆498Updated 4 months ago