Ridter / Awesome-Hacking-ResourcesLinks
A collection of hacking / penetration testing resources to make you better!
☆11Updated 7 years ago
Alternatives and similar repositories for Awesome-Hacking-Resources
Users that are interested in Awesome-Hacking-Resources are comparing it to the libraries listed below
Sorting:
- The purpose of these documents, it was to execute several efficiency and detection tests in some endpoint solutions, this document brings…☆18Updated 4 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 3 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 4 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- ☆16Updated 4 years ago
- A collection of tools created for computer security research purposes.☆126Updated 5 years ago
- ☆21Updated 4 months ago
- RATs library 2003 to present☆15Updated last year
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 7 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆52Updated 10 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆46Updated 3 years ago
- Simple script for the WHID injector - a rubberducky wifi☆115Updated last year
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆16Updated 3 years ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆21Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆70Updated 7 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Updated 7 years ago
- Well, I have created this shit for educational pruposes (I think)☆37Updated 3 years ago
- Computer Network Exploitation (CNE) Field Manual☆14Updated last year
- wfuzz, SecLists and john -based dirbusting / forceful browsing script intended to be used during web pentest assingments☆40Updated 6 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆61Updated 5 years ago
- The hacker technical cheat sheet☆41Updated 2 months ago
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆75Updated this week
- Repository of tools used in my blog☆52Updated last year
- A Simple Password Protected Back Door written in Python3☆21Updated 2 years ago
- This is the list of all rootkits found so far on github and othersites.☆30Updated 4 years ago
- Open source platform for covert data exfiltration operations, supporting all device types: computers, servers, mobile phones, tablets, pe…☆47Updated 3 years ago