TheNewAttacker64 / BooksLinks
i will upload all the books that helped me in learning in this repo
☆21Updated 2 years ago
Alternatives and similar repositories for Books
Users that are interested in Books are comparing it to the libraries listed below
Sorting:
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Simple Tool for webhacking☆11Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.☆48Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆30Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Hacking with PasteJacking technique☆22Updated 11 months ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 3 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆62Updated 4 years ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆18Updated last year
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Crawls URL to get a better image of what is tied to a website.☆33Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Social Engineering Browser Update Attack.☆56Updated last year
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆42Updated 2 years ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- Here are +200 different rats some with source code☆100Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆107Updated last year
- Red Teaming tools and techniques☆52Updated 2 years ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆19Updated last month
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆32Updated 3 years ago