S3cur3Th1sSh1t / the-book-of-secret-knowledgeLinks
A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrators, DevOps, Pentesters or Security Researchers.
☆14Updated 6 years ago
Alternatives and similar repositories for the-book-of-secret-knowledge
Users that are interested in the-book-of-secret-knowledge are comparing it to the libraries listed below
Sorting:
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆16Updated 3 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆14Updated 5 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆15Updated 2 weeks ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆18Updated 3 years ago
- Repository of tools used in my blog☆51Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Updated 7 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated 11 months ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- Sourcecode of Infostealer.Dexter POS Malware and C&C☆45Updated 9 years ago
- pen testing scripts☆12Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated this week
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 2 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- Apache Tomcat Manager API WAR Shell Upload☆35Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Windows Keylogger in C++☆19Updated 2 years ago
- this tool only for educational purpose . Disclaimer: We are no responsibility any action . if you want you use for educational purpose …☆8Updated 5 years ago
- Tutorials for getting started with Pwntools☆12Updated 3 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Updated 4 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- HoppEye is a simple payload picker for BashBunny based on linking payloads to LED color.☆30Updated 7 years ago
- Just a better dirbuster☆13Updated 2 years ago
- Packet injection for wifi; simplified.☆36Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- ⚡ Create infinate UAC prompts forcing a user to run as admin ⚡☆12Updated 3 years ago