A collection of awesome lists for hackers, pentesters & security researchers.
☆18May 8, 2018Updated 7 years ago
Alternatives and similar repositories for HackingTools-2
Users that are interested in HackingTools-2 are comparing it to the libraries listed below
Sorting:
- A simple utility to check the status of and/or disable SMBv1 on Windows system via Cb Response's Live Response functionality.☆15May 28, 2019Updated 6 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- [ICLR 2026] The official code for "Doxing via the Lens: Revealing Location-related Privacy Leakage on Multi-modal Large Reasoning Models"☆23Feb 7, 2026Updated last month
- ☆12Jan 21, 2019Updated 7 years ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- My learning guide for preparation of the CISSP exam☆13Apr 8, 2015Updated 10 years ago
- Burp Suite extension to detect Web Cache Deception vulnerabilities, now compatible with the Community Edition. Automates advanced cache …☆18Nov 18, 2025Updated 4 months ago
- نمونه سوالات و پاسخ های مصاحبه تست نفوذ برنامه های موبایل☆15Aug 21, 2023Updated 2 years ago
- Carbon Black - Facebook Threat Exchange Connector☆13May 1, 2023Updated 2 years ago
- Skills To Improve Before Heading to OSCP☆15May 14, 2017Updated 8 years ago
- GoLang File Examples☆13Nov 20, 2018Updated 7 years ago
- Open-source intelligence (OSINT)☆15Mar 1, 2024Updated 2 years ago
- Malware-Analysis-Kit☆14Aug 3, 2015Updated 10 years ago
- Burp Suite Extension to monitor new scope☆16Mar 31, 2021Updated 4 years ago
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve ac…☆36Dec 18, 2025Updated 3 months ago
- Pwn2Win CTF 2019 flag submissions☆14May 28, 2020Updated 5 years ago
- Cyper Pro Treasure Chest - Everything CyperPro☆25Nov 17, 2023Updated 2 years ago
- Pentesting Pratic Notes☆15Oct 30, 2021Updated 4 years ago
- Automation: Bash script wrapper to find and verify time base sql injection☆10Aug 25, 2022Updated 3 years ago
- Automating SQL Injection in a list of URLs or Request Files☆13Aug 8, 2016Updated 9 years ago
- ☆14Apr 29, 2020Updated 5 years ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- BTK Akademi Siber Güvenlik Operasyonları Eğitimi Materyalleri☆17Jun 5, 2024Updated last year
- The New Hacking Framework☆18Apr 26, 2017Updated 8 years ago
- ☆13Dec 14, 2022Updated 3 years ago
- XSS Finder Tool☆13Aug 25, 2016Updated 9 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆33Mar 2, 2021Updated 5 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- CTF and Bug Bounty Hunting WriteUps.☆21Feb 20, 2026Updated last month
- Intelligence-Led Cyber Attack Taxonomy, CAT☆11Aug 7, 2019Updated 6 years ago
- Windows Aktif Dizin Entegre Yönetim Uygulaması - Windows Active Directory Management☆21Dec 8, 2022Updated 3 years ago
- Taller Plug 'Em All. Introducción al Internet de las Cosas (IOT) con prácticas basadas en AdafruitIO y Wemos D1 Mini☆12Feb 7, 2020Updated 6 years ago
- Homebrew ZX Spectrum games collection☆17Sep 18, 2020Updated 5 years ago
- Small POC code that detects known root-related apps by attempting to launch their activities and monitoring security exception.☆26Mar 21, 2025Updated 11 months ago
- ☆14Jul 15, 2018Updated 7 years ago
- x86info : x86 processor register decoder.☆46May 5, 2025Updated 10 months ago
- Gets a list of all current servers on Valve's SteamPipe CDN☆14Feb 17, 2017Updated 9 years ago
- Check data breaches for Full Name, Passwords, Phone Number, Email Address, IP Address, Password Hashes - and create reports to include al…☆52Jun 17, 2024Updated last year
- PV is a program like Microsoft Spy++. Unlikely to Spy++ it allows you to edit some properties of the Controls and also allows you to mana…☆18Sep 24, 2018Updated 7 years ago