XeusHack / Awesome-Hacking-PracticeLinks
A curated list of websites and apps to help you practice hacking
☆23Updated 5 years ago
Alternatives and similar repositories for Awesome-Hacking-Practice
Users that are interested in Awesome-Hacking-Practice are comparing it to the libraries listed below
Sorting:
- Test Android Application.☆19Updated 9 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆23Updated 7 years ago
- Cryptocurrencies related Security resources☆14Updated 2 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- ☆18Updated last year
- Determine everything you need to know to about a system☆32Updated 6 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆53Updated 7 years ago
- pentest toolbox☆28Updated 2 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Updated 7 years ago
- Software exploitation training material☆15Updated 8 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Command Line Interface of ViPER Pen Testing tool.☆14Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆20Updated 5 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- The router hacking repo.☆33Updated 9 years ago
- Massive arsenal of hacker tools...☆78Updated 7 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆58Updated 6 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆34Updated 5 years ago
- JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim mu…☆19Updated 8 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Worlds first Google Android kernel rootkit as featured at DEF CON 18☆1Updated 10 years ago