ShutdownRepo / The-Hacker-ToolsLinks
This project is aimed at freely providing technical guides on various hacking tools.
☆117Updated last year
Alternatives and similar repositories for The-Hacker-Tools
Users that are interested in The-Hacker-Tools are comparing it to the libraries listed below
Sorting:
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆157Updated 11 months ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆129Updated 5 months ago
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆264Updated last month
- My Favorite Offensive Security Scripts☆83Updated 9 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆186Updated 2 months ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Updated 2 years ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆121Updated 3 months ago
- A set of instructions, command and techniques that help during an Active Directory Assessment.☆89Updated 5 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆55Updated last month
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆60Updated 3 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆80Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆107Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144Updated last year
- A python script to dump files and folders remotely from a Windows SMB share.☆227Updated last year
- Red Teaming tools and techniques☆56Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Updated 5 months ago
- ☆37Updated 4 years ago
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- Hacking resources for the Exegol project☆42Updated last week
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated last year
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆77Updated last year
- Just some things that have some cool uses☆114Updated 3 months ago
- Collection of offensive tools targeting Microsoft Azure☆217Updated 3 years ago
- ☆198Updated 3 years ago