ShutdownRepo / The-Hacker-ToolsLinks
This project is aimed at freely providing technical guides on various hacking tools.
☆119Updated last year
Alternatives and similar repositories for The-Hacker-Tools
Users that are interested in The-Hacker-Tools are comparing it to the libraries listed below
Sorting:
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆182Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- A python script to dump files and folders remotely from a Windows SMB share.☆227Updated 9 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆155Updated 9 months ago
- Generate graphs and charts based on password cracking result☆164Updated 2 years ago
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆173Updated this week
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆98Updated 2 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆113Updated last year
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆260Updated last month
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆136Updated last year
- ☆195Updated 2 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆79Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆110Updated 2 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆306Updated 2 years ago
- ☆38Updated 4 years ago
- Password spraying tool and Bloodhound integration☆247Updated 10 months ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Updated 3 months ago
- ☆45Updated 2 years ago
- My Favorite Offensive Security Scripts☆76Updated 6 months ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆115Updated 3 weeks ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆117Updated 3 months ago
- Collection of offensive tools targeting Microsoft Azure☆213Updated 2 years ago
- Red Team Guides☆142Updated last year
- Hacking resources for the Exegol project☆40Updated 2 weeks ago
- ☆305Updated 8 months ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆54Updated 9 months ago
- ☆99Updated 3 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago