SleepTheGod / Top-1000-blackhat-toolsLinks
1000 black hat tools Collected From github
☆16Updated 5 years ago
Alternatives and similar repositories for Top-1000-blackhat-tools
Users that are interested in Top-1000-blackhat-tools are comparing it to the libraries listed below
Sorting:
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Updated 2 years ago
- Web Path Finder☆60Updated last year
- Garudaastra Tool is based on python3 to find cameras around the world☆27Updated 2 years ago
- Web Penetration Testing Course Materials☆32Updated last year
- ☆25Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆40Updated last year
- Capture screenshots of onion services on an onion service.☆72Updated last year
- This is an AD pentest tools collection☆59Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 11 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated 2 years ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆51Updated 3 years ago
- Burp extension used to snip any header from all the requests.☆23Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- ☆43Updated 6 months ago
- ☆13Updated 3 years ago
- Automate Scoping, OSINT and Recon assessments.☆98Updated last week
- Challenge Python☆19Updated 2 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆29Updated 10 months ago
- Tool for scanning domains for .git directories.☆16Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated 2 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- Fast Path Traversal exploitation tool☆21Updated last year
- A custom Google search (to bypass some limitations on google and VPNs)☆112Updated 2 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last week
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆20Updated 5 years ago
- ☆24Updated last year