Ridter / Awesome-Hacking-ResourcesLinks
A collection of hacking / penetration testing resources to make you better!
☆11Updated 6 years ago
Alternatives and similar repositories for Awesome-Hacking-Resources
Users that are interested in Awesome-Hacking-Resources are comparing it to the libraries listed below
Sorting:
- The purpose of these documents, it was to execute several efficiency and detection tests in some endpoint solutions, this document brings…☆17Updated 4 years ago
- A tool for recover router password☆30Updated 7 years ago
- Open Penetration Testing Bookmarks Collection☆19Updated 10 years ago
- Example packet.proxy plugins.☆22Updated 4 years ago
- This package allows reading and writing bettercap's session recordings.☆15Updated 6 years ago
- hacking tools awesome lists☆15Updated 7 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 3 years ago
- Automated Penetration Testing☆14Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- A command line utility to interact and query the Centrifuge API.☆16Updated last year
- Remove Offensive and Profane Words from Wordlists☆15Updated last year
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- The hacker technical cheat sheet☆39Updated last week
- Collection of cracked malware☆14Updated 6 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Updated 4 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 8 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Updated 9 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆61Updated 5 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- ☆18Updated 4 years ago
- SIP hacking tools and scripts☆22Updated 4 years ago
- Kali Linux extra useful packages for CTF and Pentest activities☆11Updated last week
- Wireless regulatory database for CRDA☆13Updated 10 years ago
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- Docker environment for hackers☆15Updated 5 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago