🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation automated scripts to make hacking easier🌠. Have fun!😎
☆182Mar 23, 2024Updated last year
Alternatives and similar repositories for Infosec-and-Hacking-Scripts
Users that are interested in Infosec-and-Hacking-Scripts are comparing it to the libraries listed below
Sorting:
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆79Jan 13, 2024Updated 2 years ago
- 🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware thre…☆1,152Jan 12, 2024Updated 2 years ago
- 🚀 A curated collection of Pentesting and Hacking Scripts for Script Kiddie to Advanced Pentesters. 👨💻☆279Feb 7, 2026Updated last month
- 🚀An illustration of blockchain/Crypto technology😃 by: Building our own very simple Cryptocurrency (like Bitcoin)/ smart contracts/ Hot …☆10May 10, 2023Updated 2 years ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated last year
- My notes/solutions to the problems in "The Web Application Hacker's Handbook" (https://portswigger.net/web-security/web-application-hacke…☆29Jan 22, 2024Updated 2 years ago
- Get your USB Rubber Ducky up and running faster☆46Nov 18, 2017Updated 8 years ago
- A WiFi enabled USB Keylogger and Keystroke injection tool☆203Mar 18, 2021Updated 4 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Nov 10, 2025Updated 3 months ago
- SQL Injection attack is the most common website hacking technique. Most websites use Structured Query Language (SQL) to interact with dat…☆12Jul 16, 2022Updated 3 years ago
- ☆14May 14, 2022Updated 3 years ago
- How to hack webcams☆10Jan 7, 2022Updated 4 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Nov 21, 2021Updated 4 years ago
- Tools and methods that I personally use for Recon and Exploitations☆50May 1, 2025Updated 10 months ago
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated 2 years ago
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 2 months ago
- Run cmd or stand along server as windows service☆12Apr 25, 2022Updated 3 years ago
- SocialNetSpy© is an information gathering tool based on Python. It obtains all the social network profiles and general informations of a …☆10Oct 14, 2022Updated 3 years ago
- EDR PoC WIP LLC☆10Feb 9, 2024Updated 2 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆22Nov 6, 2024Updated last year
- Little Bug Bounty & Hacking Tools⚔️☆372Nov 10, 2024Updated last year
- Deauth and Beacon Spammer Script with Multiple functions.☆13Jul 31, 2020Updated 5 years ago
- An easy user interface for pentesting tools☆11Jun 13, 2021Updated 4 years ago
- Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.☆11Feb 3, 2024Updated 2 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- bash script to automate wardriving tasks. (Wi-Fi & Bluetooth)☆11Feb 14, 2023Updated 3 years ago
- Small collection of Active Directory pentesting tools.☆32Jan 29, 2024Updated 2 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆118Dec 5, 2018Updated 7 years ago
- ☆13Aug 16, 2017Updated 8 years ago
- Install popular tools used while pentesting & playing labs☆14Oct 8, 2021Updated 4 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Oct 5, 2022Updated 3 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆28Nov 21, 2022Updated 3 years ago
- web based c2 🏴☠️☆15Aug 10, 2024Updated last year
- A vulnerabilities database for fully-automated audits☆16Jul 20, 2023Updated 2 years ago