TheNewAttacker64 / Books
i will upload all the books that helped me in learning in this repo
☆20Updated 2 years ago
Alternatives and similar repositories for Books:
Users that are interested in Books are comparing it to the libraries listed below
- Simple Tool for webhacking☆11Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- xdebug 2.5.5 RCE exploit☆30Updated 3 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- Boost website hits by generating requests from multiple proxy IPs.☆64Updated last year
- Hacking with PasteJacking technique☆22Updated 9 months ago
- ProxyChecker Made in NodeJS☆36Updated 3 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Updated 10 months ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated 8 months ago
- Mass bruteforce authentication of common services with common credentials.☆47Updated last year
- DASH is deep osint Scanner. You just need username to start osint scan.☆48Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆39Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated 11 months ago
- Tool for bypassing logins vulnerable against SQL injection☆45Updated last year
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆40Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- Clipboard poisoning attack.☆56Updated 4 years ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated 11 months ago
- This repository contains the best fuzzing wordlist files☆29Updated 4 months ago
- Nmap & SQL injection automation tool☆33Updated 6 months ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆24Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- PassBreaker☆60Updated last year