TheNewAttacker64 / Books
i will upload all the books that helped me in learning in this repo
☆20Updated 2 years ago
Alternatives and similar repositories for Books
Users that are interested in Books are comparing it to the libraries listed below
Sorting:
- Simple Tool for webhacking☆11Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Hacking with PasteJacking technique☆22Updated 10 months ago
- Social Engineering Browser Update Attack.☆56Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆25Updated 2 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆49Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- DASH is deep osint Scanner. You just need username to start osint scan.☆48Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆44Updated 6 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated 11 months ago
- Mass bruteforce authentication of common services with common credentials.☆47Updated last year
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆63Updated 3 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆40Updated 3 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- xdebug 2.5.5 RCE exploit☆30Updated 4 months ago
- Ready to go Phishing Platform☆40Updated 7 months ago
- Tool for bypassing logins vulnerable against SQL injection☆45Updated last year
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 9 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- ☆28Updated 2 years ago
- Clipboard poisoning attack.☆56Updated 4 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- A tool designed to analyse email headers☆34Updated 2 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆16Updated 3 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆41Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year