HackList: Your go-to AI-powered guide to hands-on cybersecurity learning!
☆24Jul 6, 2025Updated 7 months ago
Alternatives and similar repositories for HackList
Users that are interested in HackList are comparing it to the libraries listed below
Sorting:
- 🛡️ ClickShield is a modern, user-friendly web application that helps users identify potentially malicious websites and phishing attempts…☆13Nov 8, 2025Updated 3 months ago
- Deep learning final year projects offer students the opportunity to explore the latest advancements in artificial intelligence and apply …☆28Feb 24, 2026Updated last week
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆70Jun 5, 2025Updated 8 months ago
- Checker de cuentas Blim para android [TERMUX]☆11Jan 21, 2019Updated 7 years ago
- A driver created to bypass the anti-cheat and r/w memory through it☆15Aug 3, 2024Updated last year
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Making a lab and testing the CVE-2024-3116, a Remote Code Execution in pgadmin <=8.4☆12Apr 11, 2024Updated last year
- Multi-layered malware detection system using static analysis, dynamic browser automation, and external APIs for accurate website threat i…☆14Jun 3, 2025Updated 9 months ago
- Scraping LegiFrance naturalisation decrees for fun and OSINT profit☆11May 27, 2023Updated 2 years ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 8 months ago
- ☆15Jan 5, 2025Updated last year
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- L3MON - Remote Android Managment Suite☆16Feb 4, 2020Updated 6 years ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆26Feb 4, 2026Updated 3 weeks ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- In-browser textual tone analyzer using window.ai API☆12Jul 22, 2024Updated last year
- Interactive Shells like PsExec, but in Go☆16Apr 30, 2025Updated 10 months ago
- The OWASP SAMM Website☆11Updated this week
- A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRA…☆11Oct 8, 2025Updated 4 months ago
- A C# PE loader for x64 and x86 PE files.☆47Feb 24, 2026Updated last week
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- bypassing the twitter safety link firewall :)☆12May 4, 2025Updated 9 months ago
- Scripts for automating actions in Cobalt Strike☆11Jul 1, 2016Updated 9 years ago
- ☆12Apr 3, 2023Updated 2 years ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆16Jan 25, 2026Updated last month
- Professional Phishing Awareness & Cybersecurity Education Platform☆23Oct 17, 2025Updated 4 months ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆13Apr 22, 2025Updated 10 months ago
- mitigation script by disabling ipv6 of all interfaces☆14Aug 15, 2024Updated last year
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- CLI to facilitate the use of video-loops as desktop background☆11Jan 3, 2026Updated 2 months ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆17Mar 27, 2024Updated last year
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated last year
- A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities fou…☆80Nov 25, 2025Updated 3 months ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆17Aug 30, 2023Updated 2 years ago
- ☆14Jun 12, 2025Updated 8 months ago
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 8 months ago
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year