TheNewAttacker64 / Books
i will upload all the books that helped me in learning in this repo
☆20Updated 2 years ago
Alternatives and similar repositories for Books:
Users that are interested in Books are comparing it to the libraries listed below
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Simple Tool for webhacking☆11Updated last year
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆18Updated 3 weeks ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- Mass bruteforce authentication of common services with common credentials.☆46Updated last year
- xdebug 2.5.5 RCE exploit☆30Updated last month
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆12Updated 9 months ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆21Updated 2 years ago
- ProxyChecker Made in NodeJS☆36Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- Hacking with PasteJacking technique☆21Updated 8 months ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Updated 9 months ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆17Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 7 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Gmail/GSuite account enumeration tool☆50Updated last year
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆40Updated 4 months ago
- Social Engineering Browser Update Attack.☆55Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated 10 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆24Updated last year
- This repository contains the best fuzzing wordlist files☆29Updated 3 months ago
- LNK-Dropper Builder☆20Updated 5 months ago
- Boost website hits by generating requests from multiple proxy IPs.☆59Updated last year