Print3M / Google-Hack-SearchLinks
Custom Google search engine dedicated to IT security & hacking stuff. Over 240 high-quality sources.
☆80Updated 3 weeks ago
Alternatives and similar repositories for Google-Hack-Search
Users that are interested in Google-Hack-Search are comparing it to the libraries listed below
Sorting:
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆69Updated last month
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆268Updated last month
- 🔒 Modern C2 Platform with Cloudflare Tunnel Integration | WinRM & SSH Remote Management | Real-time Terminal & Remote Desktop | Built wi…☆124Updated last month
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆208Updated 4 months ago
- ☆55Updated 2 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆276Updated 3 weeks ago
- RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools☆48Updated last month
- Red Team tools containerized☆74Updated 2 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆231Updated this week
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆183Updated 3 weeks ago
- Dominate the domain. Relay to royalty.☆165Updated last week
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 11 months ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆97Updated last month
- Python alternative to Mimikatz lsadump::dcshadow☆157Updated 7 months ago
- Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bo…☆505Updated last week
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆166Updated 6 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Updated 10 months ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆432Updated 3 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆44Updated 9 months ago
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆173Updated 5 months ago
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆220Updated last month
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆121Updated 5 months ago
- Decrypt Chromium based browser passwords with PowerShell.☆134Updated 2 months ago
- ☆163Updated 2 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Updated 5 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 6 months ago
- AV/EDR processes termination by exploiting a vulnerable driver (BYOVD)☆176Updated 2 weeks ago
- ☆341Updated this week
- Malware traffic obfuscation library☆39Updated 6 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆177Updated 8 months ago